Search results for: man in middle attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2131

Search results for: man in middle attack

1861 The Conduct of Laundering Money through Transport of Cash in the Middle East and North Africa Region

Authors: Haytham Yassine

Abstract:

This article mainly aims to detect and understand how money laundering activities are executed by transport of cash, identifying the underlying factors and separating legitimate from illegitimate usage of cash and how it is being used. This research provides academics with additional literature and provides bank supervisors and practitioners with a better understanding of sources and uses of cash in criminal activities and how cash is used in the laundering mechanism. Data are gathered through survey in the Middle East and North Africa region and review of the available research. The results of the analysis will help distinguish the factors affecting preference for cash rather other payment instruments in the region, identify what causes the tendency to launder illegal proceeds through cash transportation and how illegal cash is being laundered and moved. On the other hand, this paper sheds the light on major cash generating criminal activities, its sources and main destinations.

Keywords: illegitimate activities, cash, money laundering, terrorism financing

Procedia PDF Downloads 115
1860 The Role of Social Media in the Rise of Islamic State in India: An Analytical Overview

Authors: Yasmeen Cheema, Parvinder Singh

Abstract:

The evolution of Islamic State (acronym IS) has an ultimate goal of restoring the caliphate. IS threat to the global security is main concern of international community but has also raised a factual concern for India about the regular radicalization of IS ideology among Indian youth. The incident of joining Arif Ejaz Majeed, an Indian as ‘jihadist’ in IS has set strident alarm in law & enforcement agencies. On 07.03.2017, many people were injured in an Improvised Explosive Device (IED) blast on-board of Bhopal Ujjain Express. One perpetrator of this incident was killed in encounter with police. But, the biggest shock is that the conspiracy was pre-planned and the assailants who carried out the blast were influenced by the ideology perpetrated by the Islamic State. This is the first time name of IS has cropped up in a terror attack in India. It is a red indicator of violent presence of IS in India, which is spreading through social media. The IS have the capacity to influence the younger Muslim generation in India through its brutal and aggressive propaganda videos, social media apps and hatred speeches. It is a well known fact that India is on the radar of IS, as well on its ‘Caliphate Map’. IS uses Twitter, Facebook and other social media platforms constantly. Islamic State has used enticing videos, graphics, and articles on social media and try to influence persons from India & globally that their jihad is worthy. According to arrested perpetrator of IS in different cases in India, the most of Indian youths are victims to the daydreams which are fondly shown by IS. The dreams that the Muslim empire as it was before 1920 can come back with all its power and also that the Caliph and its caliphate can be re-established are shown by the IS. Indian Muslim Youth gets attracted towards these euphemistic ideologies. Islamic State has used social media for disseminating its poisonous ideology, recruitment, operational activities and for future direction of attacks. IS through social media inspired its recruits & lone wolfs to continue to rely on local networks to identify targets and access weaponry and explosives. Recently, a pro-IS media group on its Telegram platform shows Taj Mahal as the target and suggested mode of attack as a Vehicle Born Improvised Explosive Attack (VBIED). Islamic State definitely has the potential to destroy the Indian national security & peace, if timely steps are not taken. No doubt, IS has used social media as a critical mechanism for recruitment, planning and executing of terror attacks. This paper will therefore examine the specific characteristics of social media that have made it such a successful weapon for Islamic State. The rise of IS in India should be viewed as a national crisis and handled at the central level with efficient use of modern technology.

Keywords: ideology, India, Islamic State, national security, recruitment, social media, terror attack

Procedia PDF Downloads 199
1859 Detecting Venomous Files in IDS Using an Approach Based on Data Mining Algorithm

Authors: Sukhleen Kaur

Abstract:

In security groundwork, Intrusion Detection System (IDS) has become an important component. The IDS has received increasing attention in recent years. IDS is one of the effective way to detect different kinds of attacks and malicious codes in a network and help us to secure the network. Data mining techniques can be implemented to IDS, which analyses the large amount of data and gives better results. Data mining can contribute to improving intrusion detection by adding a level of focus to anomaly detection. So far the study has been carried out on finding the attacks but this paper detects the malicious files. Some intruders do not attack directly, but they hide some harmful code inside the files or may corrupt those file and attack the system. These files are detected according to some defined parameters which will form two lists of files as normal files and harmful files. After that data mining will be performed. In this paper a hybrid classifier has been used via Naive Bayes and Ripper classification methods. The results show how the uploaded file in the database will be tested against the parameters and then it is characterised as either normal or harmful file and after that the mining is performed. Moreover, when a user tries to mine on harmful file it will generate an exception that mining cannot be made on corrupted or harmful files.

Keywords: data mining, association, classification, clustering, decision tree, intrusion detection system, misuse detection, anomaly detection, naive Bayes, ripper

Procedia PDF Downloads 389
1858 Hypertensive Response to Maximal Exercise Test in Young and Middle Age Hypertensive on Blood Pressure Lowering Medication: Monotherapy vs. Combination Therapy

Authors: James Patrick A. Diaz, Raul E. Ramboyong

Abstract:

Background: Hypertensive response during maximal exercise test provides important information on the level of blood pressure control and evaluation of treatment. Method: A single center retrospective descriptive study was conducted among 117 young (aged 20 to 40) and middle age (aged 40 to 65) hypertensive patients, who underwent treadmill stress test. Currently on maintenance frontline medication either monotherapy (Angiotensin-converting enzyme inhibitor/Angiotensin receptor blocker [ACEi/ARB], Calcium channel blocker [CCB], Diuretic - Hydrochlorthiazide [HCTZ]) or combination therapy (ARB+CCB, ARB+HCTZ), who attained a maximal exercise on treadmill stress test (TMST) with hypertensive response (systolic blood pressure: male >210 mm Hg, female >190 mm Hg, diastolic blood pressure >100 mmHg, or increase of >10 mm Hg at any time during the test), on Bruce and Modified Bruce protocol. Exaggerated blood pressure response during exercise (systolic [SBP] and diastolic [DBP]), peak exercise blood pressure (SBP and DBP), recovery period (SBP and DBP) and test for ischemia and their antihypertensive medication/s were investigated. Analysis of variance and chi-square test were used for statistical analysis. Results: Hypertensive responses on maximal exercise test were seen mostly among female population (P < 0.000) and middle age (P < 0.000) patients. Exaggerated diastolic blood pressure responses were significantly lower in patients who were taking CCB (P < 0.004). A longer recovery period that showed a delayed decline in SBP was observed in patients taking ARB+HCTZ (P < 0.036). There were no significant differences in the level of exaggerated systolic blood pressure response and during peak exercise (both systolic and diastolic) in patients using either monotherapy or combination antihypertensives. Conclusion: Calcium channel blockers provided lower exaggerated diastolic BP response during maximal exercise test in hypertensive middle age patients. Patients on combination therapy using ARB+HCTZ exhibited a longer recovery period of systolic blood pressure.

Keywords: antihypertensive, exercise test, hypertension, hyperytensive response

Procedia PDF Downloads 250
1857 Parental Perceptions and Practices toward Childhood Asthma

Authors: Amani K. Abu-Shaheen, Abdullah Nofal, Humariya Heena

Abstract:

Introduction: Parental perceptions and practices are important for improving the asthma outcomes in children; indeed, evidence shows that parents of asthmatic children harbor considerable misperceptions of the disease. Objective: To identify the prevalence of asthma and to investigate the perceptions and practices of parents toward asthma and its management in Saudi children. Methods: A two-stage cross-sectional survey of 2000 parents of children aged 3–15 years from schools located in all five districts of Riyadh province located in central Saudi Arabia, was conducted. Data collection was accomplished using a self-administered questionnaire based on information obtained from the literature. Results: Of 1450 children whose parents participated in the study, 600 had asthma, dyspnea, or chest allergy. The overall number of children with parental reports of ever having been diagnosed with asthma was 478 (32.9%). The majority of parents (321, 53.5%) believed that asthma was a hereditary disease. Of these parents, 361 (60.3%) were concerned about side effects of inhaled steroids, and 192 (32%) about development of dependency on asthma medications. Three hundred sixty seven (61.2%) parents reported that they could treat the asthma attack at home and almost 76% of parents went to pediatric emergency department during asthma attack. Conclusions: In this study, the overall prevalence of children whose parents reported that they were diagnosed with asthma was high (32.9%). Furthermore, parents of children with asthma had misperceptions regarding asthma and exhibited ineffective practices in its management. To improve asthma care and compliance, adequate education should be provided to parents.

Keywords: asthma, management, parents, quality of life

Procedia PDF Downloads 250
1856 Experiences of Marital Relationship of Middle-Aged Couples in Hong Kong: Implications for Services Interventions

Authors: Wai M. Shum

Abstract:

There was evidence that the change of marital quality satisfaction was related to the different stages of the family life cycle. Research studies have been largely based on western contexts, which found a curvilinear U-shaped trend in changes of marital satisfaction over the course of a marriage, but little is known about the marital experiences of Hong Kong couples. Through in-depth interviews, this qualitative study explored the marital relationship of middle-aged couples in a satisfying marriage and to identify how couples maintain a satisfying relationship in the local context. Findings from this study suggested twelve themes with some showing consistency with previous literature, such as communication, companionship, trust, and fidelity. The affective aspects of empathetic understanding and perceived empathy were found to have an enormous effect on couples’ bondedness. The high level of differentiation and security served as a basis for unconditional contribution, acceptance, and adjustment to unsolvable issues such that negative emotion would not be escalated. The manifestations of intimacy and commitment in the triangular theory of love were more frequently addressed than passion in striving for marital longevity in the local context. This study challenged the curvilinear trend of marital satisfaction throughout marriage, with couples showing different pathways of marital satisfaction. The study gave insights on martial enrichment, such as facilitating couples to disclose their vulnerabilities, desire for physical intimacy, and passion in the pursuit of enduring marriage instead of an emphasis on skills training on communication and conflict resolution.

Keywords: intimacy, marital relationship, marital satisfaction, middle-aged

Procedia PDF Downloads 86
1855 The Dietary Behavior of Eating Alone in Middle-Aged Populations by Body Mass Index (BMI)

Authors: Pil Kyoo Jo, Youngmee Lee, Jee Young Kim, Yu Jin Oh, Sohyun Park, Young Ha Joo, Hye Suk Kim, Semi Kang

Abstract:

A growing number of people are living alone and eating alone. People might have different dietary behaviors between eating alone and eating with others, it can influence their weight and health. The purpose of this study was to investigate the dietary behavior of eating alone in middle-aged populations in South Korea. We used the nationally representative data from the 5th Korea National Health and Nutrition Examination Survey (KNHANES), 2010-2012 and a cross-sectional survey on the eating behaviors among adults (N=1318, 530 men, 788 women) aged from 20 to 54 years. Results showed that ‘underweight’ group ate more amount of food when eating with others compared to eating alone and ‘overweight’ and ‘obesity’ groups had opposite respondent (p<0.05). When having a meal alone, ‘underweight’ group ate food until didn’t feel hungry and ‘overweight’ and ‘obesity’ groups ate leftover food even they felt full (p<0.01). The ‘overweight’ and ‘obesity’ groups usually ate alone than ‘underweight’ group did (p<0.05). All groups had faster meal time when eating alone than eating with others and usually ate processed foods for convenience when eating alone. Younger people, aged 10-30, ate more processed food than older people did. South Koreans spend nearly 45% of their total food consumption from processed foods. This research was supported by the National Research Foundation of Korea for 2011 Korea-Japan Basic Scientific Cooperation Program (NRF-2011B00003). This work was supported by the Ministry of Education of the Republic of Korea and the National Research Foundation of Korea (NRF-2015S1A5B6037369).

Keywords: BMI, dietary behavior, eating alone, middle-aged populations

Procedia PDF Downloads 242
1854 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks

Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner

Abstract:

Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.

Keywords: USB, device, cyber security, attack, detection

Procedia PDF Downloads 356
1853 Proposal of Optimality Evaluation for Quantum Secure Communication Protocols by Taking the Average of the Main Protocol Parameters: Efficiency, Security and Practicality

Authors: Georgi Bebrov, Rozalina Dimova

Abstract:

In the field of quantum secure communication, there is no evaluation that characterizes quantum secure communication (QSC) protocols in a complete, general manner. The current paper addresses the problem concerning the lack of such an evaluation for QSC protocols by introducing an optimality evaluation, which is expressed as the average over the three main parameters of QSC protocols: efficiency, security, and practicality. For the efficiency evaluation, the common expression of this parameter is used, which incorporates all the classical and quantum resources (bits and qubits) utilized for transferring a certain amount of information (bits) in a secure manner. By using criteria approach whether or not certain criteria are met, an expression for the practicality evaluation is presented, which accounts for the complexity of the QSC practical realization. Based on the error rates that the common quantum attacks (Measurement and resend, Intercept and resend, probe attack, and entanglement swapping attack) induce, the security evaluation for a QSC protocol is proposed as the minimum function taken over the error rates of the mentioned quantum attacks. For the sake of clarity, an example is presented in order to show how the optimality is calculated.

Keywords: quantum cryptography, quantum secure communcation, quantum secure direct communcation security, quantum secure direct communcation efficiency, quantum secure direct communcation practicality

Procedia PDF Downloads 152
1852 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions

Authors: Behnam Zahednejad, Saeed Kosari

Abstract:

Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.

Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif

Procedia PDF Downloads 70
1851 Phishing Detection: Comparison between Uniform Resource Locator and Content-Based Detection

Authors: Nuur Ezaini Akmar Ismail, Norbazilah Rahim, Norul Huda Md Rasdi, Maslina Daud

Abstract:

A web application is the most targeted by the attacker because the web application is accessible by the end users. It has become more advantageous to the attacker since not all the end users aware of what kind of sensitive data already leaked by them through the Internet especially via social network in shake on ‘sharing’. The attacker can use this information such as personal details, a favourite of artists, a favourite of actors or actress, music, politics, and medical records to customize phishing attack thus trick the user to click on malware-laced attachments. The Phishing attack is one of the most popular attacks for social engineering technique against web applications. There are several methods to detect phishing websites such as Blacklist/Whitelist based detection, heuristic-based, and visual similarity-based detection. This paper illustrated a comparison between the heuristic-based technique using features of a uniform resource locator (URL) and visual similarity-based detection techniques that compares the content of a suspected phishing page with the legitimate one in order to detect new phishing sites based on the paper reviewed from the past few years. The comparison focuses on three indicators which are false positive and negative, accuracy of the method, and time consumed to detect phishing website.

Keywords: heuristic-based technique, phishing detection, social engineering and visual similarity-based technique

Procedia PDF Downloads 152
1850 Assessment of the Performance of Fly Ash Based Geo-Polymer Concrete under Sulphate and Acid Attack

Authors: Talakokula Visalakshi

Abstract:

Concrete is the most commonly used construction material across the globe, its usage is second only to water. It is prepared using ordinary Portland cement whose production contributes to 5-8% of total carbon emission in the world. On the other hand the fly ash by product from the power plants is produced in huge quantities is termed as waste and disposed in landfills. In order to address the above issues mentioned, it is essential that other forms of binding material must be developed in place of cement to make concrete. The geo polymer concrete is one such alternative developed by Davidovits in 1980’s. Geopolymer do not form calcium-silicate hydrates for matrix formation and strength but undergo polycondensation of silica and alumina precursors to attain structural strength. Its setting mechanism depends upon polymerization rather than hydration. As a result it is able to achieve its strength in 3-5 days whereas concrete requires about a month to do the same. The objective of this research is to assess the performance of geopolymer concrete under sulphate and acid attack. The assessment is done based on the experiments conducted on geopolymer concrete. The expected outcomes include that if geopolymer concrete is more durable than normal concrete, then it could be a competitive replacement option of concrete and can lead to significant reduction of carbon foot print and have a positive impact on the environment. Fly ash based geopolymer concrete offers an opportunity to completely remove the cement content from concrete thereby making the concrete a greener and future construction material.

Keywords: fly ash, geo polymer, geopolymer concrete, construction material

Procedia PDF Downloads 461
1849 Identification of Watershed Landscape Character Types in Middle Yangtze River within Wuhan Metropolitan Area

Authors: Huijie Wang, Bin Zhang

Abstract:

In China, the middle reaches of the Yangtze River are well-developed, boasting a wealth of different types of watershed landscape. In this regard, landscape character assessment (LCA) can serve as a basis for protection, management and planning of trans-regional watershed landscape types. For this study, we chose the middle reaches of the Yangtze River in Wuhan metropolitan area as our study site, wherein the water system consists of rich variety in landscape types. We analyzed trans-regional data to cluster and identify types of landscape characteristics at two levels. 55 basins were analyzed as variables with topography, land cover and river system features in order to identify the watershed landscape character types. For watershed landscape, drainage density and degree of curvature were specified as special variables to directly reflect the regional differences of river system features. Then, we used the principal component analysis (PCA) method and hierarchical clustering algorithm based on the geographic information system (GIS) and statistical products and services solution (SPSS) to obtain results for clusters of watershed landscape which were divided into 8 characteristic groups. These groups highlighted watershed landscape characteristics of different river systems as well as key landscape characteristics that can serve as a basis for targeted protection of watershed landscape characteristics, thus helping to rationally develop multi-value landscape resources and promote coordinated development of trans-regions.

Keywords: GIS, hierarchical clustering, landscape character, landscape typology, principal component analysis, watershed

Procedia PDF Downloads 178
1848 Estimation of Pressure Profile and Boundary Layer Characteristics over NACA 4412 Airfoil

Authors: Anwar Ul Haque, Waqar Asrar, Erwin Sulaeman, Jaffar S. M. Ali

Abstract:

Pressure distribution data of the standard airfoils is usually used for the calibration purposes in subsonic wind tunnels. Results of such experiments are quite old and obtained by using the model in the spanwise direction. In this manuscript, pressure distribution over NACA 4412 airfoil model was presented by placing the 3D model in the lateral direction. The model is made of metal with pressure ports distributed longitudinally as well as in the lateral direction. The pressure model was attached to the floor of the tunnel with the help of the base plate to give the specified angle of attack to the model. Before the start of the experiments, the pressure tubes of the respective ports of the 128 ports pressure scanner are checked for leakage, and the losses due to the length of the pipes were also incorporated in the results for the specified pressure range. Growth rate maps of the boundary layer thickness were also plotted. It was found that with the increase in the velocity, the dynamic pressure distribution was also increased for the alpha seep. Plots of pressure distribution so obtained were overlapped with those obtained by using XFLR software, a low fidelity tool. It was found that at moderate and high angles of attack, the distribution of the pressure coefficients obtained from the experiments is high when compared with the XFLR ® results obtained along with the span of the wing. This under-prediction by XFLR ® is more obvious on the windward than on the leeward side.

Keywords: subsonic flow, boundary layer, wind tunnel, pressure testing

Procedia PDF Downloads 296
1847 Experimental and Numerical Study of Ultra-High-Performance Fiber-Reinforced Concrete Column Subjected to Axial and Eccentric Loads

Authors: Chengfeng Fang, Mohamed Ali Sadakkathulla, Abdul Sheikh

Abstract:

Ultra-high-performance fiber reinforced concrete (UHPFRC) is a specially formulated cement-based composite characterized with an ultra-high compressive strength (fc = 240 MPa) and a low water-cement ratio (W/B= 0.2). With such material characteristics, UHPFRC is favored for the design and constructions of structures required high structural performance and slender geometries. Unlike conventional concrete, the structural performance of members manufactured with UHPFRC has not yet been fully studied, particularly, for UHPFRC columns with high slenderness. In this study, the behaviors of slender UHPFRC columns under concentric or eccentric load will be investigated both experimentally and numerically. Four slender UHPFRC columns were tested under eccentric loads with eccentricities, of 0 mm, 35 mm, 50 mm, and 85 mm, respectively, and one UHPFRC beam was tested under four-point bending. Finite element (FE) analysis was conducted with concrete damage plasticity (CDP) modulus to simulating the load-middle height or middle span deflection relationships and damage patterns of all UHPFRC members. Simulated results were compared against the experimental results and observation to gain the confidence of FE model, and this model was further extended to conduct parametric studies, which aim to investigate the effects of slenderness regarding failure modes and load-moment interaction relationships. Experimental results showed that the load bearing capacities of the slender columns reduced with an increase in eccentricity. Comparisons between load-middle height and middle span deflection relationships as well as damage patterns of all UHPFRC members obtained both experimentally and numerically demonstrated high accuracy of the FE simulations. Based on the available FE model, the following parametric study indicated that a further increase in the slenderness of column resulted in significant decreases in the load-bearing capacities, ductility index, and flexural bending capacities.

Keywords: eccentric loads, ductility index, RC column, slenderness, UHPFRC

Procedia PDF Downloads 101
1846 Seismic Interpretation and Petrophysical Evaluation of SM Field, Libya

Authors: Abdalla Abdelnabi, Yousf Abushalah

Abstract:

The G Formation is a major gas producing reservoir in the SM Field, eastern, Libya. It is called G limestone because it consists of shallow marine limestone. Well data and 3D-Seismic in conjunction with the results of a previous study were used to delineate the hydrocarbon reservoir of Middle Eocene G-Formation of SM Field area. The data include three-dimensional seismic data acquired in 2009. It covers approximately an area of 75 mi² and with more than 9 wells penetrating the reservoir. Seismic data are used to identify any stratigraphic and structural and features such as channels and faults and which may play a significant role in hydrocarbon traps. The well data are used to calculation petrophysical analysis of S field. The average porosity of the Middle Eocene G Formation is very good with porosity reaching 24% especially around well W 6. Average water saturation was calculated for each well from porosity and resistivity logs using Archie’s formula. The average water saturation for the whole well is 25%. Structural mapping of top and bottom of Middle Eocene G formation revealed the highest area in the SM field is at 4800 ft subsea around wells W4, W5, W6, and W7 and the deepest point is at 4950 ft subsea. Correlation between wells using well data and structural maps created from seismic data revealed that net thickness of G Formation range from 0 ft in the north part of the field to 235 ft in southwest and south part of the field. The gas water contact is found at 4860 ft using the resistivity log. The net isopach map using both the trapezoidal and pyramid rules are used to calculate the total bulk volume. The original gas in place and the recoverable gas were calculated volumetrically to be 890 Billion Standard Cubic Feet (BSCF) and 630 (BSCF) respectively.

Keywords: 3D seismic data, well logging, petrel, kingdom suite

Procedia PDF Downloads 125
1845 Role of Radiologic Technologist Specialist in Plain Image Interpretation of Adults in the Middle East: A Radiologist’s Perspective

Authors: Awad Mohamed Elkhadir, Rajab M. Ben Yousef

Abstract:

Background/Aim: Radiological technologists are medical professionals who perform diagnostic imaging tests such as X-rays, magnetic resonance imaging (MRI) scans, and computer tomography (CT) scans. Despite the recognition of image interpretation by British radiologists, it is still considered a problem in the Arab world. This study evaluates the perceptions of radiologists in the Middle East concerning the plain image interpretation of adults by radiologic technologist specialists. Methods: This is a cross-sectional study that follows a quantitative approach. A close-ended questionnaire was distributed among 103 participants who were radiologists by profession from various hospitals in Saudi Arabia and Sudan. The gathered data was then analyzed through Statistical Package for Social Sciences (SPSS). Results: The results showed that 29% recognized the Radiologic Technologist Specialist (RTS) role of writing image reports, while 61% did not. A total of 38% of participants believed that RTS image interpretation would help diagnose unreported radiographs. 47% of the sample responded that the workload and stress on radiologists would reduce by allowing reporting for RTS, while 37% did not. Lastly, 43% believe that image interpretation by RTS can be introduced into the Middle East in the future. Conclusion: The study's findings reveal that the combination of image reporting and radiography improves the care of the patients. The study's outcomes also show that the burden of the medical practitioners reduces due to image reporting of the radiographers. Further researches need to be conducted in the Arab World to obtain and measure the associated factors of the desired criteria.

Keywords: Arab world, image interpretation, radiographer, radiologist, Saudi Arabia, Sudan

Procedia PDF Downloads 67
1844 A South African Perspective on Palestine and the Motivation for a One-State Solution

Authors: Farhin Delawala

Abstract:

In the context of Palestine and the broader Middle East, this study delves into the Apartheid regime in Palestine, the country under occupation, and the intricate ties between the United States of America (USA) and the settler colony of ‘Israel’. The paper provides an explanation of the colonisation of Palestine as well as the forms of Apartheid. Moreover, it explains the provisions of United Nations (UN) international laws and how they have been broken by the settler colony of ‘Israel’. The paper contends that the US, motivated by its security interests in the region, has strategically influenced the political instability in the Middle East and the illegal occupation of Palestine. Furthermore, this paper proposes an alternative path of a one-state solution to foster a more peaceful and stable society and advocates for the integration of the Palestinian population into the region, from Gaza and the West Bank, under equal citizen rights. Thereby, the ethno-theocratic nature of the settler colony as an ethno-theocratic state is dismantled.

Keywords: apartheid, one-state solution, Palestine, political instability, settler colony

Procedia PDF Downloads 27
1843 Numerical Simulation of the Effect of Single and Dual Synthetic Jet on Stall Phenomenon On NACA (National Advisory Committee for Aeronautics) GA(W)-2 Airfoil

Authors: Abbasali Abouei Mehrizi, Hamid Hassanzadeh Afrouzi

Abstract:

Reducing the drag force increases the efficiency of the aircraft and its better performance. Flow control methods delay the phenomenon of flow separation and consequently reduce the reversed flow phenomenon in the separation region and enhance the performance of the lift force while decreasing the drag force and thus improving the aircraft efficiency. Flow control methods can be divided into active and passive types. The use of synthetic jets actuator (SJA) used in this study for NACA GA (W) -2 airfoil is one of the active flow control methods to prevent stall phenomenon on the airfoil. In this research, the relevant airfoil in different angles of attack with and without jets has been compared by OpenFOAM. Also, after achieving the proper SJA position on the airfoil suction surface, the simultaneous effect of two SJAs has been discussed. It was found to have the best effect at 12% chord (C), close to the airfoil’s leading edge (LE). At 12% chord, SJA decreases the drag significantly with increasing lift, and also, the average lift increase was higher than other situations and was equal to 10.4%. The highest drag reduction was about 5% in SJA=0.25C. Then, due to the positive effects of SJA in the 12% and 25% chord regions, these regions were considered for applying dual jets in two post-stall angles of attack, i.e., 16° and 22°.

Keywords: active and passive flow control methods, computational fluid dynamics, flow separation, synthetic jet

Procedia PDF Downloads 45
1842 Anesthetic Considerations for Carotid Endarterectomy: Prospective Study Based on Clinical Trials

Authors: Ahmed Yousef A. Al Sultan

Abstract:

Introduction: The aim of this review is based on clinical research that studies the changes in middle cerebral artery velocity using Transcranial Doppler (TCD) and cerebral oxygen saturation using cerebral oximetry in patients undergoing carotid endarterectomy (CEA) surgery under local anesthesia (LA). Patients with or without neurological symptoms during the surgery are taking a role in this study using triplet method of cerebral oximetry, transcranial doppler and awake test in detecting any cerebral ischemic symptoms. Methods: about one hundred patients took part during their CEA surgeries under local anesthesia, using triple assessment mentioned method, Patients requiring general anesthesia be excluded from analysis. All data were recorded at eight surgery stages separately to serve this study. Results: In total regional cerebral oxygen saturation (rSO2), middle cerebral artery (MCA) velocity, and pulsatility index were significantly decreased during carotid artery clamping step in CEA procedures on the targeted carotid side. With most observed changes in MCA velocity during the study. Discussion: Cerebral oxygen saturation and middle cerebral artery velocity were significantly decreased during clamping step of the procedures on the targeted side. The team with neurological symptoms during the procedures showed higher changes of rSO2 and MCA velocity than the team without neurological symptoms. Cerebral rSO2 and MCA velocity significantly increased directly after de-clamping of the internal carotid artery on the affected side.

Keywords: awake testing, carotid endarterectomy, cerebral oximetry, Tanscranial Doppler

Procedia PDF Downloads 140
1841 Off-Policy Q-learning Technique for Intrusion Response in Network Security

Authors: Zheni S. Stefanova, Kandethody M. Ramachandran

Abstract:

With the increasing dependency on our computer devices, we face the necessity of adequate, efficient and effective mechanisms, for protecting our network. There are two main problems that Intrusion Detection Systems (IDS) attempt to solve. 1) To detect the attack, by analyzing the incoming traffic and inspect the network (intrusion detection). 2) To produce a prompt response when the attack occurs (intrusion prevention). It is critical creating an Intrusion detection model that will detect a breach in the system on time and also challenging making it provide an automatic and with an acceptable delay response at every single stage of the monitoring process. We cannot afford to adopt security measures with a high exploiting computational power, and we are not able to accept a mechanism that will react with a delay. In this paper, we will propose an intrusion response mechanism that is based on artificial intelligence, and more precisely, reinforcement learning techniques (RLT). The RLT will help us to create a decision agent, who will control the process of interacting with the undetermined environment. The goal is to find an optimal policy, which will represent the intrusion response, therefore, to solve the Reinforcement learning problem, using a Q-learning approach. Our agent will produce an optimal immediate response, in the process of evaluating the network traffic.This Q-learning approach will establish the balance between exploration and exploitation and provide a unique, self-learning and strategic artificial intelligence response mechanism for IDS.

Keywords: cyber security, intrusion prevention, optimal policy, Q-learning

Procedia PDF Downloads 202
1840 The Link between Strategic Sense-Making and Performance in Dubai Public Sector

Authors: Mohammad Rahman, Guy Burton, Megan Mathias

Abstract:

Strategic management as an organizational practice was adopted by the public sector in the New Public Management (NPM) era that began in most parts of the world in the 1980s. Strategy as a new public management concept was subscribed by governments in both developed and developing world, as they were persuaded that clearly defined vision, mission and goals, as well as programs and projects - aligned with the goals - could potentially help achieve government vision at the national level and organizational goals at the service-delivery level. The advocates for strategic management in the public sector saw an inherent link between strategy and performance, claiming that the implementation of organizational strategy has an effect on the overall performance of an organization. Arguably, many government entities that have failed in enhancing team and individual performance had poorly-designed strategy or weak strategy implementation. Another key argument about low-level performance is linked with lack of strategic sense-making and orientation by middle managers in particular. Scholars maintain that employees at all levels need to understand strategic management plan in order to facilitate its implementation. Therefore, involving employees (particularly the middle managers) from the beginning potentially helps an organization avoid the drop in performance, and on the contrary would increase their commitment. The United Arab Emirates (UAE) is well known for adopting public sector reform strategies and tools since the 1990s. This observation is contextually pertinent in the case of the Government of Dubai, which has provided a Strategy Execution Guide to all of its entities to achieve high level strategic success in service delivery. The Dubai public sector also adopts road maps for e-Government, Smart Dubai, Expo 2020, investment, environment, education, health and other sectors. Evidently, some of these strategies are bringing tangible (e.g. Smart Dubai transformation) results in a transformational manner. However, the amount of academic research and literature on the strategy process vis-à-vis staff performance in the Government of Dubai is limited. In this backdrop, this study examines how individual performance of public sector employees in Dubai is linked with their sense-making, engagement and orientation with strategy development and implementation processes. Based on a theoretical framework, this study will undertake a sample-based questionnaire survey amongst middle managers in Dubai public sector to (a) measure the level of engagement of middle managers in strategy development and implementation processes as perceived by them; (b) observe the organizational landscape in which role expectations are placed on middle managers; and (c) examine the impact of employee engagement in strategy development process and the conditions for role expectations on individual performance. The paper is expected to provide new insights on the interface between strategic sense-making and performance in order to contribute a better understanding of the current culture/practices of staff engagement in strategic management in the public sector of Dubai.

Keywords: employee performance, government of Dubai, middle managers, strategic sense-making

Procedia PDF Downloads 170
1839 Normal or Abnormal: A Case Study of Jihadi Salafism in the Middle East

Authors: Yusef Karimi, Masoomeh Esmaeily, Razgar Mohammadi

Abstract:

Following the events of September 11th, one of the most important concerns of governments, politicians and, researchers has been to answer the question that why does an ordinary person become fundamentalism? One of the major controversies in past researches was about as to whether a fundamentalist person is normal or abnormal. In this regard, the purpose of this research is to investigate whether a Salafi-jihadi individual is normal or abnormal. The participants included 6 Jihadi Salafism individuals who were living in the Middle East and had been purposefully selected. This research is a qualitative study which examines these people′s retrospective experience of their lives. The data were collected through collaborative observation and interview. This continued till data saturation. Unlike the introduced concepts of fundamentalist personality in the previous studies such as self-fascination, aggression, paranoid personality and psychopathic, participants in this study had no abnormal symptoms of mental disorders. Hence, in the context of recognizing the fundamentalist personality, we must seek other personality and positional variables.

Keywords: abnormal, fundamentalism, normal, personality, Salafi

Procedia PDF Downloads 131
1838 Tectono-Thermal Evolution of Ningwu-Jingle Basin in North China Craton: Constraints from Apatite (U–Th-Sm)/He and Fission Track Thermochronology

Authors: Zhibin Lei, Minghui Yang

Abstract:

Ningwu-Jingle basin is a structural syncline which has undergone a complex tectono-thermal history since Cretaceous. It stretches along the strike of the northern Lvliang Mountains which are the most important mountains in the middle and west of North China Craton. The Mesozoic units make up of the core of Ningwu-Jingle Basin, with pre-Mesozoic units making up of its flanks. The available low-temperature thermochronology implies that Ningwu-Jingle Basin has experienced two stages of uplifting: 94±7Ma to 111±8Ma (Albian to Cenomanian) and 62±4 to 75±5Ma (Danian to Maastrichtian). In order to constrain its tectono-thermal history in the Cenozoic, both apatite (U-Th-Sm)/He and fission track dating analysis are applied on 3 Middle Jurassic and 3 Upper Triassic sandstone samples. The central fission track ages range from 74.4±8.8Ma to 66.0±8.0Ma (Campanian to Maastrichtian) which matches well with previous data. The central He ages range from 20.1±1.2Ma to 49.1±3.0Ma (Ypresian to Burdigalian). Inverse thermal modeling is established based on both apatite fission track data and (U-Th-Sm)/He data. The thermal history obtained reveals that all 6 sandstone samples cross the high-temperature limit of fission track partial annealing zone by the uppermost Cretaceous and that of He partial retention zone by the uppermost Eocene to the early Oligocene. The result indicates that the middle and west of North China Craton is not stable in the Cenozoic.

Keywords: apatite fission track thermochronology, apatite (u–th)/he thermochronology, Ningwu-Jingle basin, North China craton, tectono-thermal history

Procedia PDF Downloads 227
1837 Financial Development, Institutional Quality and Environmental Conditions in the Middle East and North Africa Region: Evidence From Oil- And Non-oil-Producing Countries

Authors: Jamel Boukhatem, Semia Rachid, Marmar Nasr

Abstract:

Considering the differences between oil- and non-oil-producing countries, this paper aims to evaluate the impact of financial development (FD) and institutional quality (IQ) on CO2 emissions in 15 MENA (Middle East and North Africa) countries over the period 1996-2018 using the Panel ARDL approach. We found evidence to support an unconditional long run effect of FD on environmental conditions (EC), with quite significant differences between the two groups of countries. While FD leads to environmental degradation (ED) in non-oil-producing countries, it helps protect the environment in oil-producing ones. Regarding the effects of IQ on EC, they are not significant in both short- and long run for non-oil-producing countries, but they are significant for oil-producing ones only in the long run. In the short run, IQ indicators haven’t significant effects on EC for the two groups of countries.

Keywords: financial development, institutional quality, environmental conditions, Panel ARDL

Procedia PDF Downloads 49
1836 Software-Defined Networking: A New Approach to Fifth Generation Networks: Security Issues and Challenges Ahead

Authors: Behrooz Daneshmand

Abstract:

Software Defined Networking (SDN) is designed to meet the future needs of 5G mobile networks. The SDN architecture offers a new solution that involves separating the control plane from the data plane, which is usually paired together. Network functions traditionally performed on specific hardware can now be abstracted and virtualized on any device, and a centralized software-based administration approach is based on a central controller, facilitating the development of modern applications and services. These plan standards clear the way for a more adaptable, speedier, and more energetic network beneath computer program control compared with a conventional network. We accept SDN gives modern inquire about openings to security, and it can significantly affect network security research in numerous diverse ways. Subsequently, the SDN architecture engages systems to effectively screen activity and analyze threats to facilitate security approach modification and security benefit insertion. The segregation of the data planes and control and, be that as it may, opens security challenges, such as man-in-the-middle attacks (MIMA), denial of service (DoS) attacks, and immersion attacks. In this paper, we analyze security threats to each layer of SDN - application layer - southbound interfaces/northbound interfaces - controller layer and data layer. From a security point of see, the components that make up the SDN architecture have a few vulnerabilities, which may be abused by aggressors to perform noxious activities and hence influence the network and its administrations. Software-defined network assaults are shockingly a reality these days. In a nutshell, this paper highlights architectural weaknesses and develops attack vectors at each layer, which leads to conclusions about further progress in identifying the consequences of attacks and proposing mitigation strategies.

Keywords: software-defined networking, security, SDN, 5G/IMT-2020

Procedia PDF Downloads 63
1835 Application of Hydrological Model in Support of Streamflow Allocation in Arid Watersheds in Northwestern China

Authors: Chansheng He, Lanhui Zhang, Baoqing Zhang

Abstract:

Spatial heterogeneity of landscape significantly affects watershed hydrological processes, particularly in high elevation and cold mountainous watersheds such as the inland river (terminal lake) basins in Northwest China, where the upper reach mountainous areas are the main source of streamflow for the downstream agricultural oases and desert ecosystems. Thus, it is essential to take into account spatial variations of hydrological processes in streamflow allocation at the watershed scale. This paper adapts the Distributed Large Basin Runoff Model (DLBRM) to the Heihe River Watershed, the second largest inland river with a drainage area of about 128,000 km2 in Northwest China, for understanding the transfer and partitioning mechanism among the glacier and snowmelt, surface runoff, evapotranspiration, and groundwater recharge among the upper, middle, and lower reaches in the study area. Results indicate that the upper reach Qilian Mountain area is the main source of streamflow for the middle reach agricultural oasis and downstream desert areas. Large withdrawals for agricultural irrigation in the middle reach had significantly depleted river flow for the lower reach desert ecosystems. Innovative conservation and enforcement programs need to be undertaken to ensure the successful implementation of water allocation plan of delivering 0.95 x 109 m3 of water downstream annually by the State Council in the Heihe River Watershed.

Keywords: DLBRM, Northwestern China, spatial variation, water allocation

Procedia PDF Downloads 272
1834 DYVELOP Method Implementation for the Research Development in Small and Middle Enterprises

Authors: Jiří F. Urbánek, David Král

Abstract:

Small and Middle Enterprises (SME) have a specific mission, characteristics, and behavior in global business competitive environments. They must respect policy, rules, requirements and standards in all their inherent and outer processes of supply - customer chains and networks. Paper aims and purposes are to introduce computational assistance, which enables us the using of prevailing operation system MS Office (SmartArt...) for mathematical models, using DYVELOP (Dynamic Vector Logistics of Processes) method. It is providing for SMS´s global environment the capability and profit to achieve its commitment regarding the effectiveness of the quality management system in customer requirements meeting and also the continual improvement of the organization’s and SME´s processes overall performance and efficiency, as well as its societal security via continual planning improvement. DYVELOP model´s maps - the Blazons are able mathematically - graphically express the relationships among entities, actors, and processes, including the discovering and modeling of the cycling cases and their phases. The blazons need live PowerPoint presentation for better comprehension of this paper mission – added value analysis. The crisis management of SMEs is obliged to use the cycles for successful coping of crisis situations.  Several times cycling of these cases is a necessary condition for the encompassment of the both the emergency event and the mitigation of organization´s damages. Uninterrupted and continuous cycling process is a good indicator and controlling actor of SME continuity and its sustainable development advanced possibilities.

Keywords: blazons, computational assistance, DYVELOP method, small and middle enterprises

Procedia PDF Downloads 317
1833 Arabic Fables in Contemporary Garbs: Ahmed Shawqī’s Reconstruction of Fables in the Modern Era

Authors: Monia Hejaiej

Abstract:

The fable has lent itself to memorable imitations and reinventions. The writing of fables, in prose and verse, was widely cultivated not only in pre-Islamic Arabia but also in the middle ages, reaching its culmination with the Egyptian poet and man of letters Ahmad Shawqī (1989-1932), who revived the ancient tradition, a relatively minor and unexploited genre in the modern era, and re-wrote rimed fables with an Arab Islamic flavor, articulating a set of modern ethico-political concepts and sensibilities such as a belief in good judgment in governance, individual liberty, democracy, a sense of the brotherhood of man and justice. This essay aims to restore the 20th Century poet to his rightful place in the international pantheon of literary achievement, and offers an examination of the Arabian fabulist tradition as it appears in Arabic literature, and a treatment of this genre re-visiting a few representative samples of Ahmad Shawqī collection of fables and their implications for contemporary politics in the Middle East.

Keywords: fable, politcs, governace, democracy, ethics of care

Procedia PDF Downloads 646
1832 Comparative Analysis of the Treatment of the Success of the First Crusade in Modern Arab and Western Historiography

Authors: Oleg Sokolov

Abstract:

Despite the fact that the epoch of the Crusades ended more than 700 years ago, its legacy still remains relevant both in the Middle East and in the West. There was made a comparison of the positions of the most prominent Western and Arab medievalists of XX-XXI centuries, using the example of their interpretations of the success of the First Crusade. The analyzed corpus consists of 70 works. In the modern Arab Historiography, it is often pointed out that the Seljuks' struggle against the crusaders of the First Crusade was seriously hampered by the raids of the Arab Bedouin tribes of Jazira. At the same time, it is emphasized that the Arab rulers of Northern Syria were ‘pleased’ with the defeats of the Turks and made peace with the Crusaders, refusing to fight them. At the same time it is usually underlined that the Fatimid aggression against the Turks led both the first and the second to defeat from the Crusaders and became one of the main reasons for the success of the First Crusade and the Muslims' loss of Jerusalem in 1099. The position of Western historians about the reasons for the success of the First Crusade differs significantly. First of all, in the Western Historiography, it is noted that the deaths of the Fatimid and Abbasid Caliphs and the Seljuk Sultan between 1092 and 1094 years created political vacuum just before the crusaders appeared in the Middle East political arena. In 1097-1099, when the Crusaders advanced through Asia Minor, Syria and Palestine to Jerusalem, there was an active internecine struggle between the parts of the Seljuq state that had broken up by that time, and the crusaders were not perceived as a general threat of all Muslims of this region at that time. It is also pointed out that the main goals of the Crusaders - Antioch, Edessa, and Jerusalem - were at that time periphery since the main struggle for power in the Middle East was at this time in Iran. Thus, Arab historians see the lack of support from Arabs of Syria and Jazira and the aggression from Egypt as a crucial factors preventing the Seljuks from defeating the Crusaders, while their Western counterparts consider the internal power struggle between the Seljuks as a more important reason for the success of the First Crusade. The reason for this divergence in the treatment of the events of the First Crusade is probably the prevailing in much of Arab historiography, the idea of the Franks as an enemy of all peoples and religions of the Middle East. At the same time, in contemporary Western Historiography, the crusaders are described only as one of the many military and political forces that operated in this region at the end of the eleventh century.

Keywords: Arabs, Crusades, historiography, Turks

Procedia PDF Downloads 141