Search results for: man in middle attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2131

Search results for: man in middle attack

1891 US Foreign Aids and Its Institutional and Non-Institutional Impacts in the Middle East, Africa, Southeast Asia, and Latin America (2000 - 2020)

Authors: Mahdi Fakheri, Mohammad Mohsen Mahdizadeh Naeini

Abstract:

This paper addresses an understudied aspect of U.S. foreign aids between the years 2000 and 2020. Despite a growing body of literature on the impacts of U.S. aids, the question about how the United States uses its foreign aids to change developing countries has remained unanswered. As foreign aid is a tool of the United States' foreign policy, answering this very question can reveal the future that the U.S. prefers for developing countries and that secures its national interest. This paper will explore USAID's official dataset, which includes the data of foreign aids to the Middle East, Africa, Latin America, and Southeast Asia from 2000 to 2020. Through an empirical analysis, this paper argues that the focus of U.S. foreign aid is evenly divided between institutional and non-institutional (i.e., slight enhancement of status quo) changes. The former is induced by training and education, funding the initiatives and projects, making capacity and increasing the efficiency of human, operational, and management sectors, and enhancing the living condition of the people. Moreover, it will be demonstrated that the political, military, cultural, economic, and judicial are some of the institutions that the U.S. has planned to change in the aforementioned period and regions.

Keywords: USAID, foreign aid, development, developing countries, Middle East, Africa, Southeast Asia, Latin America

Procedia PDF Downloads 160
1890 Life Table and Functional Response of Scolothrips takahashii (Thysanoptera: Thripidae) on Tetranychus urticae (Acari:Tetranychidae)

Authors: Kuang-Chi Pan, Shu-Jen Tuan

Abstract:

Scolothrips takahashii Priesner (Thysanoptera: Thripidae) is a common predatory thrips which feeds on spider mites; it is considered an important natural enemy and a potential biological control agent against spider mites. In order to evaluate the efficacy of S. takahashii against tetranychid mites, life table and functional response study were conducted at 25±1°C, with Tetranychus urticae Priesner as prey. The intrinsic rate of increase (r), finite rate of increase (λ), net reproduction rate (R₀), mean generation time (T) were 0.1674 d⁻¹, 1.1822d⁻¹, 62.26 offspring/individual, and 24.68d. The net consumption rate (C₀) was 846.15, mean daily consumption rate was 51.92 eggs for females and 19.28 eggs for males. S. takahashii exhibited type III functional response when offered T. urticae deutonymphs. Based on the random predator equation, the estimated maximum attack rate (a) and handling time (Th) were 0.1376h⁻¹ and 0.7883h. In addition, a life table experiment was conducted to evaluate the offspring sex allocation and population dynamic of Tetranychus ludeni Zacher under group-rearing conditions with different sex ratios. All bisexual groups produced offspring with similar sex allocation patterns, which started with the majority of females, then transited during the middle of the oviposition period and turned male-biased at the end of the oviposition period.

Keywords: Scolothrips takahashii, Tetranychus urticae, Tetranychus ludeni, two-sex life table, functional response, sex allocation

Procedia PDF Downloads 47
1889 Experimental Investigation of Boundary Layer Transition on Rotating Cones in Axial Flow in 0 and 35 Degrees Angle of Attack

Authors: Ali Kargar, Kamyar Mansour

Abstract:

In this paper, experimental results of using hot wire anemometer and smoke visualization are presented. The results obtained on the hot wire anemometer for critical Reynolds number and transitional Reynolds number are compared by previous results. Excellent agreement is found for the transitional Reynolds number. The results for the transitional Reynolds number are also compared by previous linear stability results. The results of the smoke visualization clearly show the cross flow vortices which arise in the transition process from a laminar to a turbulent flow. A non-zero angle of attack is also considered. We compare our results by linear stability theory which was done by Garret et. Al (2007). We just emphasis, Also the visualization and hot wire anemometer results have been compared graphically. The goal in this paper is to check reliability of using hot wire anemometer and smoke visualization in transition problems and check reliability of linear stability theory for this case and compare our results with some trusty experimental works.

Keywords: transitional reynolds number, wind tunnel, rotating cone, smoke visualization

Procedia PDF Downloads 274
1888 Silent Myocardial Infarction Presented with Homonymous Hemianopia in a Non-Diabetic Middle Aged Man

Authors: Seyed Fakhroddin Hejazi, Mohammad Saleh Sadeghi, Leili Iranirad

Abstract:

Silent myocardial infarction is defined as the appearance of pathological Q waves in the electrocardiogram, without objective signs of myocardial infarction and any minimal or atypical symptoms. Although this condition has been known for a long time, but little is known about its phenomenon and the mechanisms of it remain unclear. Its coincidence with stroke is also still controversial. This case report introduces a middle-aged man with silent myocardial infarction presented with homonymous hemianopia, which except stage 1 hypertension, had no other major cardiovascular risk factors including diabetes mellitus, hypercholesterolemia, family history of cardiac diseases and smoking. In conclusion, this case report indicated that existence of only one cardiovascular risk factor would lead to the development of MI or stroke.

Keywords: silent myocardial infarction, homonymous hemianopia, stroke, hypertension

Procedia PDF Downloads 255
1887 Trajectories of PTSD from 2-3 Years to 5-6 Years among Asian Americans after the World Trade Center Attack

Authors: Winnie Kung, Xinhua Liu, Debbie Huang, Patricia Kim, Keon Kim, Xiaoran Wang, Lawrence Yang

Abstract:

Considerable Asian Americans were exposed to the World Trade Center attack due to the proximity of the site to Chinatown and a sizeable number of South Asians working in the collapsed and damaged buildings nearby. Few studies focused on Asians in examining the disaster’s mental health impact, and even less longitudinal studies were reported beyond the first couple of years after the event. Based on the World Trade Center Health Registry, this study examined the trajectory of PTSD of individuals directly exposed to the attack from 2-3 to 5-6 years after the attack, comparing Asians against the non-Hispanic White group. Participants included 2,431 Asians and 31,455 Whites. Trajectories were delineated into the resilient, chronic, delayed-onset and remitted groups using PTSD checklist cut-off score at 44 at the 2 waves. Logistic regression analyses were conducted to compare the poorer trajectories against the resilient as a reference group, using predictors of baseline sociodemographic, exposure to the disaster, lower respiratory symptoms and previous depression/anxiety disorder diagnosis, and recruitment source as the control variable. Asians had significant lower socioeconomic status in terms of income, education and employment status compared to Whites. Over 3/4 of participants from both races were resilient, though slightly less for Asians than Whites (76.5% vs 79.8%). Asians had a higher proportion with chronic PTSD (8.6% vs 7.4%) and remission (5.9% vs 3.4%) than Whites. A considerable proportion of participants had delayed-onset in both races (9.1% Asians vs 9.4% Whites). The distribution of trajectories differed significantly by race (p<0.0001) with Asians faring poorer. For Asians, in the chronic vs resilient group, significant protective factors included age >65, annual household income >$50,000, and never married vs married/cohabiting; risk factors were direct disaster exposure, job loss due to 9/11, lost someone, and tangible loss; lower respiratory symptoms and previous mental disorder diagnoses. Similar protective and risk factors were noted for the delayed-onset group, except education being protective; and being an immigrant a risk. Between the 2 comparisons, the chronic group was more vulnerable than the delayed-onset as expected. It should also be noted that in both comparisons, Asians’ current employment status had no significant impact on their PTSD trajectory. Comparing between Asians against Whites, the direction of the relationships between the predictors and the PTSD trajectories were mostly the same, although more factors were significant for Whites than for Asians. A few factors showed significant racial difference: Higher risk for lower respiratory symptoms for Whites than Asians, higher risk for pre-9/11 mental disorder diagnosis for Asians than Whites, and immigrant a risk factor for the remitted vs resilient groups for Whites but not for Asians. Over 17% Asians still suffered from PTSD 5-6 years after the WTC attack signified its persistent impact which incurred substantial human, social and economic costs. The more disadvantaged socioeconomic status of Asians rendered them more vulnerable in their mental health trajectories relative to Whites. Together with their well-documented low tendency to seek mental health help, outreach effort to this population is needed to ensure follow-up treatment and prevention.

Keywords: PTSD, Asian Americans, World Trade Center Attack, racial differences

Procedia PDF Downloads 231
1886 Improved Hash Value Based Stream CipherUsing Delayed Feedback with Carry Shift Register

Authors: K. K. Soundra Pandian, Bhupendra Gupta

Abstract:

In the modern era, as the application data’s are massive and complex, it needs to be secured from the adversary attack. In this context, a non-recursive key based integrated spritz stream cipher with the circulant hash function using delayed feedback with carry shift register (d-FCSR) is proposed in this paper. The novelty of this proposed stream cipher algorithm is to engender the improved keystream using d-FCSR. The proposed algorithm is coded using Verilog HDL to produce dynamic binary key stream and implemented on commercially available FPGA device Virtex 5 xc5vlx110t-2ff1136. The implementation of stream cipher using d-FCSR on the FPGA device operates at a maximum frequency of 60.62 MHz. It achieved the data throughput of 492 Mbps and improved in terms of efficiency (throughput/area) compared to existing techniques. This paper also briefs the cryptanalysis of proposed circulant hash value based spritz stream cipher using d-FCSR is against the adversary attack on a hardware platform for the hardware based cryptography applications.

Keywords: cryptography, circulant function, field programmable gated array, hash value, spritz stream cipher

Procedia PDF Downloads 223
1885 Urban Conservation Methodology for Heritage Areas Case Study "Qabel Street, Old Jeddah"

Authors: Hossam Elborombaly, Nader Y. Azab

Abstract:

The Middle East region is rich with its architecture and urban settings. This makes it viable for exploring and applying different strategies that deal with conservation. Current context characterized by pollution, socioeconomic issues, behavioral problems, etc. affects architectural and urban heritage –literally- in all Middle Eastern countries. Although there have been numerous strategies in place to preserve and/ or rehabilitate heritage, all has been designed and implemented following political more than technical or methodical processes. This only resulted in more deterioration of the targeted areas. This paper explores different approaches in some selected Arab countries and relies on comparative analysis with some successful European experiences. The aim is to establish some solid basis for dealing with heritage areas; an approach that respects heritage and traditions without compromising sustainability or socioeconomic opportunities.

Keywords: conservation, heritage, identity, urban conservation methodology,

Procedia PDF Downloads 351
1884 Secret Agents in the Azores during the Second World War and the Impact of Espionage on Portuguese-British Relations

Authors: Marisa Galiza Filipe

Abstract:

In 1942, at the height of the Second World War, Roosevelt and Churchill planned to occupy the Azores to establish air and naval bases. The islands' privileged position in the middle of the Atlantic made them a strategic location for both the Axis and the Allies. For the Germans, the occupation of the island was also a strategic place to launch an attack on the United States of America, and for the British and Americans, the islands were the perfect spot to counterattack the German sinking of British boats and submarines. Salazar avoided the concession of the islands until 1943, claiming, on the one hand, the policy of neutrality, a decision made in agreement with England, and on the other hand, the reaffirmation of Portuguese sovereignty over the territory. Aware of the constant changes and supported by a network of informers on the islands, the German and British spies played a crucial role in the negotiations between Portugal and the Allies and the ceding of the bases by Salazar, which prevented their forced occupation. The espionage caused several diplomatic tensions, and the large number of German spies denounced by the British, operating on the islands under the watchful eye of the PVDE and Salazar, weakened the Portuguese-British alliance. Using primary source documents in the Ministério dos Negócios Estrangeiros (MNE) archives, this paper introduces the spies that operated on the islands, their missions and motives, organizations, and modus operandi. As a chess game, any move was careful thinking and the spies were valuable assets to control and use information that could lead to the occupation of the islands and, ultimately, change the tide of the war.

Keywords: espionage, Azores, WWI, neutrality

Procedia PDF Downloads 20
1883 Design and Emotion: The Value of 1970s French Children’s Books in the Middle East

Authors: Tina Sleiman

Abstract:

In the early 1970s, a graphics revolution - in quantity and quality - marked the youth publications sector in France. The increased interest in youth publications was supported with the emergence of youth libraries and major publishing houses. In parallel, the 'Agence de Cooperation Culturelle et Technique' (currently the International Organization of the Francophonie) was created, and several Arab countries had joined as members. In spite of political turmoil in the Middle East, French schools in Arab countries were still functioning and some even flourishing. This is a testament that French culture was, and still is, a major export to the region. This study focuses on the aesthetic value of the graphic styles that characterize French children’s books from the 1970s, and their personal value to Francophone people who have consumed these artifacts, in the Middle East. The first part of the study looks at the artifact itself: starting from the context of creation and consumption of these books, and continuing to the preservation and remaining collections. The aesthetic value is studied and compared to similar types of visuals of juxtaposed time periods. The second part examines the audience’s response to the visuals in terms of style recognition or identification, along with emotional significance or associations, and the personal value the artifacts might hold to their consumers. The methods of investigation consist of a literature review, a survey of book collections, and a visual questionnaire, supported by personal interviews. As an outcome, visual patterns will be identified: elements from 1970s children’s books reborn in contemporary youth-based publications. Results of the study shall inform us directly on the aesthetic and personal value of illustrated French children’s books in the Middle East, and indirectly on the capacity of youth-targeted design to create a long-term emotional response from its audience.

Keywords: children’s books, French visual culture, graphic style, publication design, revival

Procedia PDF Downloads 139
1882 Understanding the Life Experience of Middle Class Married Women Betrayal

Authors: Sara Sharifi Yazdi

Abstract:

The main purpose of this study is to find out about the reasons and the ways of middle-class married women betrayal via their living world. This is qualitative research, so deep semi-structured, episodic interview techniques and observation techniques were used to collect data; meanwhile, the basic theory method was used to analyze the data. The sample in this research includes 34 women with emotional and sexual relationships out of marriage. The results indicate that some set of conditions created the first spark of change in their opinions. These changes are empowered through both experiences of tolerance and exclusion, so strategies such as distance, compulsive tolerance, counteract, etc. have been used for reacting by the people in this study; besides some of the other consequences of betrayal which can be named are lack of comfort, feeling of deprivation, violence, labeling, guilty feelings of grief, and so on.

Keywords: living world, rejection, admission, betrayal, sexual relationship, marriage

Procedia PDF Downloads 115
1881 A Study on Relationship of Lifestyle and Socio-Economic Status with Obesity in Indian Children

Authors: Sushma Ghildyal, Sanjay Kumar Singh

Abstract:

The present study was undertaken with the purpose to understand the relationship of lifestyle and Socio-Economic status with child obesity among 1000 boys aged from 16 to 18 years of Varanasi District of Uttar Pradesh State in India. The study was conducted in both urban and rural area of the District. Ten schools i.e. five from urban area and five from rural area were selected by using purposive sampling. Healthy boys of class 10th, 11th and 12th were taken as subjects for the study. Prior consent was obtained from school authority. Anthropometric measurements were taken from each subject. Anthropometric measurements were Standing Height, Weight, Biceps skin folds, Triceps skin folds, Sub-scapular skin folds and Supra-iliac skin folds taken by Lange’s skin fold caliper. Lifestyle and Socio-Economic Status were obtained by questionnaires. In order to assess the BMI, Body fat %, Lifestyle and Socio-Economic Status; descriptive analyses were done. To find out the significant association of obesity with lifestyle and Socio-Economic Status Chi-square test was used. To find out significant difference between obesity of Urban and Rural children t-test was applied. Level of significance was set at 0.05 level. The conclusions drawn were: (1) The result showed that in urban area Varanasi District of Uttar Pradesh 0.6% children were in very high level adaptive lifestyle, 6.2% were in high level adaptive lifestyle, 25.4% above average level adaptive lifestyle, 47.8% moderately adaptive lifestyle, 3.6% and 0.4% low and very low level adaptive lifestyle. (2) In rural area Varanasi District of Uttar Pradesh 0.00% children were in very high level adaptive lifestyle, 9.4% were in high level adaptive lifestyle, 24.8% average level adaptive lifestyle, 47.0% moderately adaptive lifestyle, 15.2% below average and 3.0% very low level adaptive lifestyle.(3) In urban area 12.8% were in upper class Socio-Economic Status, 56.6% in upper middle class Socio-Economic Status, 30.2% in middle class Socio-Economic Status and 0.2% in lower middle class Socio-Economic Status. (4) In rural area 1.4% were in upper class Socio-Economic Status, 15.2% in upper middle class Socio-Economic Status, 51.6% in middle class Socio-Economic Status and 0.8% in lower middle class Socio-Economic Status. (5) In urban area 21.2% children of 16-18 years were obese. (6) In rural area 0.2% children of 16-18 years were obese. (7) In overall Varanasi District of Uttar Pradesh 10.7% children of 16-18 years were obese. (8) There was no significant relationship of obesity with Lifestyle of urban area children of 16-18 years. (9) There was significant relationship of obesity with Socio-Economic Status of urban area children of 16-18 years (10) There was no significant relationship of obesity with Lifestyle of rural area children of 16-18 years of Varanasi District Uttar Pradesh. (11) There was significant relationship of obesity with Socio-Economic Status of rural area children of 16-18 years. (12) Results showed significant difference between urban and rural area children of 16-18 years in respect to obesity of Varanasi District of Uttar Pradesh.

Keywords: lifestyle, obesity, rural area, socio-economic status, urban area

Procedia PDF Downloads 457
1880 Urban Conservation Methodology for Heritage Areas: A Case Study in Qabel Street, Old Jeddah

Authors: Hossam Hassan Elborombaly, Nader Y. Azab

Abstract:

The Middle East region is rich with its architecture and urban settings. This makes it viable for exploring and applying different strategies that deal with conservation. Current context characterized by pollution, socioeconomic issues, behavioral problems, etc. affects architectural and urban heritage –literally- in all Middle Eastern countries. Although there have been numerous strategies in place to preserve and/ or rehabilitate heritage, all has been designed and implemented following political more than technical or methodical processes. This only resulted in more deterioration of the targeted areas. This paper explores different approaches in some selected Arab countries and relies on comparative analysis with some successful European experiences. The aim is to establish some solid basis for dealing with heritage areas; an approach that respects heritage and traditions without compromising sustainability or socioeconomic opportunities.

Keywords: rehabilitation, socioeconomic, urban conservation, urban strategy

Procedia PDF Downloads 512
1879 Postcolonial Production and Transnational Circulation- A Critical Analysis of Kuwait's Contribution to Middle Eastern Cinema

Authors: Najat Alsheridah

Abstract:

Despite its major contribution to the production and distribution of film and cinema in the Middle East, the Kuwaiti film industry remains underresearched. Shortly after the discovery of oil in 1938, foreign filmmakers arrived to document the life and culture of Kuwaitis. The region's second cinema company, Cinescape, was established in the country in 1954, playing a significant role in the circulation of films in the Middle East. The industry has grown considerably, producing 37 films between 2010 and 2020, compared to 9 films in the first decade of the century and only three from 1970-2000. This research is one of the few attempts to provide a history of films in Kuwait as social practice, from its inception to the present day. A historical analysis of the Kuwaiti film industry presents significant challenges. Almost all of the early footage has been lost, and the filmmaking pioneers are no longer alive. This research uses interviews with contemporary directors, actors, and critics to reconstruct historical perspectives of film in Kuwait. In addition, this research uses a critical discourse analysis of industry texts, newspaper interviews, and government reports relating to film censorship and regulation. This materialist approach examines film as social practice, identifying the key social actors in the industry and examining its development in relation to the country's social, economic, and political situation. This research shows that the oil industry has both enabled and restricted the production and circulation of Kuwaiti film. Despite the colonial occupation, decades of regional conflict, and strict government censorship, the country's film industry has continued to contribute to the transnational circulation of stories representing the life and culture of Middle Eastern people. Moreover, the growing domestic film industry has replaced foreign filmmakers with new representations of Kuwaiti lived experience. A lack of government grants, film studies programs, and production infrastructure has contributed to the marginalization of the industry. However, this research provides original scholarly translations of Kuwaiti industry experts and an analysis of its history. This greater recognition by Middle Eastern film studies of Kuwait's contribution to social film history will help it continue growing.

Keywords: cinescape, kuwait, oil, postcolonial, transnational circulation, world cinema

Procedia PDF Downloads 124
1878 China’s Health Silk Road in Southeast Asia and Europe during COVID-19

Authors: Wanda Luen-Wun Siu, Xiaowen Zhang

Abstract:

The COVID-19 pandemic has presented an opportune time for China to deploy its health diplomacy around the world. This paper focused on China’s health diplomacy along the path of its Health Silk Road, with particular emphasis on the Middle East and Europe amid COVID-19. This paper employed a retrospective literature review, analyzed China’s health diplomacy in such regions to cultivate bilateral and multilateral relationships. And findings argued that such health diplomacy is a success, and Beijing has assumed a leadership role in the world’s health governance. This research contributes to the literature in health diplomacy and suggests that amid the ever changing international order, China has exerted great effort in its health diplomacy and established itself as a responsible world power.

Keywords: china’s health silk road, COVID-19, europe, middle east

Procedia PDF Downloads 184
1877 Studies on Race Car Aerodynamics at Wing in Ground Effect

Authors: Dharni Vasudhevan Venkatesan, K. E. Shanjay, H. Sujith Kumar, N. A. Abhilash, D. Aswin Ram, V. R. Sanal Kumar

Abstract:

Numerical studies on race car aerodynamics at wing in ground effect have been carried out using a steady 3d, double precision, pressure-based, and standard k-epsilon turbulence model. Through various parametric analytical studies we have observed that at a particular speed and ground clearance of the wings a favorable negative lift was found high at a particular angle of attack for all the physical models considered in this paper. The fact is that if the ground clearance height to chord length (h/c) is too small, the developing boundary layers from either side (the ground and the lower surface of the wing) can interact, leading to an altered variation of the aerodynamic characteristics at wing in ground effect. Therefore a suitable ground clearance must be predicted throughout the racing for a better performance of the race car, which obviously depends upon the coupled effects of the topography, wing orientation with respect to the ground, the incoming flow features and/or the race car speed. We have concluded that for the design of high performance and high speed race cars the adjustable wings capable to alter the ground clearance and the angles of attack is the best design option for any race car for racing safely with variable speeds.

Keywords: external aerodynamics, external flow choking, race car aerodynamics, wing in ground effect

Procedia PDF Downloads 329
1876 Gender Equality for the Environment: Positioning India

Authors: Nivedita Roy, Aparajita Chattopadhyay

Abstract:

Gender discrimination is already one of the major factors why India is still in the list of the 3rd World Countries, but, when it comes to gender inclusion in the environmental arena, this umbrella concept is quite unheard of by our countrymen. The main objective was to assess gender equality for the environment through calculating Environment and Gender Index on a country level, India, in this case. 22 states out of 29 were considered for calculation. Also, out of the 72 countries chosen by IUCN to calculate EGI, the lower middle income group of countries was chosen to assess the position of India, also a lower middle income group country, among them. Linear Regression is executed through SPSS and simple graphs and tables are prepared through MS-EXCEL for analysis. India portrays good governance, reporting activities well to the UN but in terms of basic livelihood and gender equality, the performance is comparatively weak.

Keywords: environment, gender, livelihood, rights, participation, development, conservation

Procedia PDF Downloads 408
1875 An Analytical Metric and Process for Critical Infrastructure Architecture System Availability Determination in Distributed Computing Environments under Infrastructure Attack

Authors: Vincent Andrew Cappellano

Abstract:

In the early phases of critical infrastructure system design, translating distributed computing requirements to an architecture has risk given the multitude of approaches (e.g., cloud, edge, fog). In many systems, a single requirement for system uptime / availability is used to encompass the system’s intended operations. However, when architected systems may perform to those availability requirements only during normal operations and not during component failure, or during outages caused by adversary attacks on critical infrastructure (e.g., physical, cyber). System designers lack a structured method to evaluate availability requirements against candidate system architectures through deep degradation scenarios (i.e., normal ops all the way down to significant damage of communications or physical nodes). This increases risk of poor selection of a candidate architecture due to the absence of insight into true performance for systems that must operate as a piece of critical infrastructure. This research effort proposes a process to analyze critical infrastructure system availability requirements and a candidate set of systems architectures, producing a metric assessing these architectures over a spectrum of degradations to aid in selecting appropriate resilient architectures. To accomplish this effort, a set of simulation and evaluation efforts are undertaken that will process, in an automated way, a set of sample requirements into a set of potential architectures where system functions and capabilities are distributed across nodes. Nodes and links will have specific characteristics and based on sampled requirements, contribute to the overall system functionality, such that as they are impacted/degraded, the impacted functional availability of a system can be determined. A machine learning reinforcement-based agent will structurally impact the nodes, links, and characteristics (e.g., bandwidth, latency) of a given architecture to provide an assessment of system functional uptime/availability under these scenarios. By varying the intensity of the attack and related aspects, we can create a structured method of evaluating the performance of candidate architectures against each other to create a metric rating its resilience to these attack types/strategies. Through multiple simulation iterations, sufficient data will exist to compare this availability metric, and an architectural recommendation against the baseline requirements, in comparison to existing multi-factor computing architectural selection processes. It is intended that this additional data will create an improvement in the matching of resilient critical infrastructure system requirements to the correct architectures and implementations that will support improved operation during times of system degradation due to failures and infrastructure attacks.

Keywords: architecture, resiliency, availability, cyber-attack

Procedia PDF Downloads 69
1874 A New DIDS Design Based on a Combination Feature Selection Approach

Authors: Adel Sabry Eesa, Adnan Mohsin Abdulazeez Brifcani, Zeynep Orman

Abstract:

Feature selection has been used in many fields such as classification, data mining and object recognition and proven to be effective for removing irrelevant and redundant features from the original data set. In this paper, a new design of distributed intrusion detection system using a combination feature selection model based on bees and decision tree. Bees algorithm is used as the search strategy to find the optimal subset of features, whereas decision tree is used as a judgment for the selected features. Both the produced features and the generated rules are used by Decision Making Mobile Agent to decide whether there is an attack or not in the networks. Decision Making Mobile Agent will migrate through the networks, moving from node to another, if it found that there is an attack on one of the nodes, it then alerts the user through User Interface Agent or takes some action through Action Mobile Agent. The KDD Cup 99 data set is used to test the effectiveness of the proposed system. The results show that even if only four features are used, the proposed system gives a better performance when it is compared with the obtained results using all 41 features.

Keywords: distributed intrusion detection system, mobile agent, feature selection, bees algorithm, decision tree

Procedia PDF Downloads 367
1873 Beneath the Leisurely Surface: An Analysis of the Piano Lesson Frenzy among Chinese Middle-Class Parents

Authors: Yijie Wang, Tianyue Wang

Abstract:

In the past two decades, there has been a great ‘piano lesson frenzy’ among Chinese middle-class families, with a large number of parents adding piano training to children’s extra-curriculum lists. Superficially, the frenzy reflects a rather ‘leisurely’ attitude: parents typically claim that pianos lessons are ‘just for fun’ and will hopefully render children’s life more exciting. However, a closer scrutiny reveals that there is great social-status anxiety hidden beneath this ‘leisurely’ surface. Based on pre-interviews of six Chinese middle-class parents who have enthusiastically signed their children up for piano lessons, several tentative analysis are made: 1. Owing to a series of historical and social factors, the Chinese middle-class have yet to establish their cultural norms in the past few decades, resulting in great confusion concerning how to cultivate cultural tastes in their offspring. And partly due to the fact that the middle-class status of the past Chinese generation is mostly self-acquired rather than inherited, parents are much less confident about their cultural resources—which require long-time accumulation—than material ones. Both factors combine to lead to a sort of blind, overcompensating enthusiasm in culture-related education, and the piano frenzy is but a demonstration. 2. The piano has been chosen to be the object of the frenzy partly because of its inherent characteristics as well as socially-constructed ones. Costly, large in size, imported from another culture and so forth, the piano has acquired the meaning of being exclusive, high-end and exotic, which renders it a token of top-tier status among Chinese people, and piano lessons for offspring have therefore become parents’ paths towards a kind of ‘symbolic elevation’. A child playing piano is an exhibition as well as psychological assurance of the families’ middle-class status. 3. A closer look at children’s piano training process reveals that there is much more anxiety than leisurely elements involved. Despite parents’ claim that ‘piano is mainly for kids to have fun,’ the whole process is evidently of a rather ‘ascetic’ nature, with the demands of diligence and senses of time urgency throughout, and techniques rather than flair or styles are emphasized. This either means that the apparent ‘piano-for-fun’ stance is unauthentic and is only other motives in disguise, or that the Chinese middle-class parents are not yet capable of shaking off the sense of anxiety even if they sincerely intend to. 4. When viewed in relation to Chinese formal school system as well as the job market at large, it can be said that by signing children up for piano lessons, parents are consciously or unconsciously seeking to prepare for, or reduce the risks of, their children’s future social mobility. In face of possible failures in the highly-crucial, highly-competitive formal school system, piano-playing as an extra-curriculum activity may be conveniently transferred into an alternative career path. Besides, in contemporary China, as the occupational structure goes through change, and the school-related certificates decline in value, aspects such as a person’s overall deportment, which can be gained or proved by piano-learning, have been gaining in significance.

Keywords: extra-curriculum activities, middle class, piano lesson frenzy, status anxiety

Procedia PDF Downloads 216
1872 Moving Target Defense against Various Attack Models in Time Sensitive Networks

Authors: Johannes Günther

Abstract:

Time Sensitive Networking (TSN), standardized in the IEEE 802.1 standard, has been lent increasing attention in the context of mission critical systems. Such mission critical systems, e.g., in the automotive domain, aviation, industrial, and smart factory domain, are responsible for coordinating complex functionalities in real time. In many of these contexts, a reliable data exchange fulfilling hard time constraints and quality of service (QoS) conditions is of critical importance. TSN standards are able to provide guarantees for deterministic communication behaviour, which is in contrast to common best-effort approaches. Therefore, the superior QoS guarantees of TSN may aid in the development of new technologies, which rely on low latencies and specific bandwidth demands being fulfilled. TSN extends existing Ethernet protocols with numerous standards, providing means for synchronization, management, and overall real-time focussed capabilities. These additional QoS guarantees, as well as management mechanisms, lead to an increased attack surface for potential malicious attackers. As TSN guarantees certain deadlines for priority traffic, an attacker may degrade the QoS by delaying a packet beyond its deadline or even execute a denial of service (DoS) attack if the delays lead to packets being dropped. However, thus far, security concerns have not played a major role in the design of such standards. Thus, while TSN does provide valuable additional characteristics to existing common Ethernet protocols, it leads to new attack vectors on networks and allows for a range of potential attacks. One answer to these security risks is to deploy defense mechanisms according to a moving target defense (MTD) strategy. The core idea relies on the reduction of the attackers' knowledge about the network. Typically, mission-critical systems suffer from an asymmetric disadvantage. DoS or QoS-degradation attacks may be preceded by long periods of reconnaissance, during which the attacker may learn about the network topology, its characteristics, traffic patterns, priorities, bandwidth demands, periodic characteristics on links and switches, and so on. Here, we implemented and tested several MTD-like defense strategies against different attacker models of varying capabilities and budgets, as well as collaborative attacks of multiple attackers within a network, all within the context of TSN networks. We modelled the networks and tested our defense strategies on an OMNET++ testbench, with networks of different sizes and topologies, ranging from a couple dozen hosts and switches to significantly larger set-ups.

Keywords: network security, time sensitive networking, moving target defense, cyber security

Procedia PDF Downloads 41
1871 Mainland China and Taiwan’s Strategies for Overcoming the Middle/High Income Trap: Domestic Consensus-Building and the Foundations of Cross-Strait Interactions

Authors: Mingke Ma

Abstract:

The recent discovery of the High-Income Trap phenomena and the established Middle-Income Trap literature have identified the similarity of the structural challenges that both Mainland China and Taiwan have been facing since the simultaneous growth slowdown from the 2000s. Mainland China and Taiwan’s ineffectiveness in productivity growth weakened their overall competitiveness in Global Value Chains. With the subsequent decline of industrial profitability, social compression from late development persists and jeopardises the social cohesion. From Ma Ying-jeou’s ‘633’ promise and Tsai Ing-wen’s ‘5+2’ industrial framework to Mainland China’s 11th to 14th Five-Year Plans, leaderships across the Strait have been striving to constitute new models for inclusive and sustainable development through policy responses. This study argues that social consensuses that have been constructed by the domestic political processes define the feasibility of the reform strategies, which further construct the conditions for Cross-Strait interactions. Based on the existing literature of New Institutional Economics, Middle/High Income Trap, and Compressed Development, this study adopts a Historical Institutionalist analytical framework to identify how the historical path-dependency contributes to the contemporary growth constraints in both economies and the political difficulty on navigating the institutional and Organisational change. It continues by tracing the political process of economic reform to examine the sustainability and resilience of the manifested social consensus that had empowered the proposed policy frameworks. Afterwards, it examines how the political outcomes in such a simultaneous process shared by both Mainland China and Taiwan construct the social, economic, institutional, and political foundations of contemporary Cross-Strait engagement.

Keywords: historical institutionalism, political economy, cross-strait relations, high/middle income trap

Procedia PDF Downloads 169
1870 Control Flow around NACA 4415 Airfoil Using Slot and Injection

Authors: Imine Zakaria, Meftah Sidi Mohamed El Amine

Abstract:

One of the most vital aerodynamic organs of a flying machine is the wing, which allows it to fly in the air efficiently. The flow around the wing is very sensitive to changes in the angle of attack. Beyond a value, there is a phenomenon of the boundary layer separation on the upper surface, which causes instability and total degradation of aerodynamic performance called a stall. However, controlling flow around an airfoil has become a researcher concern in the aeronautics field. There are two techniques for controlling flow around a wing to improve its aerodynamic performance: passive and active controls. Blowing and suction are among the active techniques that control the boundary layer separation around an airfoil. Their objective is to give energy to the air particles in the boundary layer separation zones and to create vortex structures that will homogenize the velocity near the wall and allow control. Blowing and suction have long been used as flow control actuators around obstacles. In 1904 Prandtl applied a permanent blowing to a cylinder to delay the boundary layer separation. In the present study, several numerical investigations have been developed to predict a turbulent flow around an aerodynamic profile. CFD code was used for several angles of attack in order to validate the present work with that of the literature in the case of a clean profile. The variation of the lift coefficient CL with the momentum coefficient

Keywords: CFD, control flow, lift, slot

Procedia PDF Downloads 155
1869 A Dynamic Panel Model to Evaluate the Impact of Debt Relief on Poverty

Authors: Loujaina Abdelwahed

Abstract:

Debt relief granted to low-and middle-income countries effectively provides additional funds for governments that can be used to increase public investment on poverty-reducing services to alleviate poverty and boost economic growth. However, little is known about the extent to which the poor benefit from the increased public investment. This study aims to assess the impact of debt relief granted through multiple initiatives during the 1990s on poverty reduction. In particular, it assesses the impact on the level, depth and severity of poverty in 76 low-and middle income countries over the period 1990-2011. Debt relief is found to have a significant impact on reducing the level, the depth and the severity of poverty. Analysis of the different types of debt relief reveals that debt service relief reduces poverty, whereas debt principle relief does not have a significant impact.

Keywords: debt relief, developing countries, HIPC, poverty, system GMM estimator

Procedia PDF Downloads 367
1868 Study of Land Use Changes around an Archaeological Site Using Satellite Imagery Analysis: A Case Study of Hathnora, Madhya Pradesh, India

Authors: Pranita Shivankar, Arun Suryawanshi, Prabodhachandra Deshmukh, S. V. C. Kameswara Rao

Abstract:

Many undesirable significant changes in landscapes and the regions in the vicinity of historically important structures occur as impacts due to anthropogenic activities over a period of time. A better understanding of such influences using recently developed satellite remote sensing techniques helps in planning the strategies for minimizing the negative impacts on the existing environment. In 1982, a fossilized hominid skull cap was discovered at a site located along the northern bank of the east-west flowing river Narmada in the village Hathnora. Close to the same site, the presence of Late Acheulian and Middle Palaeolithic tools have been discovered in the immediately overlying pebbly gravel, suggesting that the ‘Narmada skull’ may be from the Middle Pleistocene age. The reviews of recently carried out research studies relevant to hominid remains all over the world from Late Acheulian and Middle Palaeolithic sites suggest succession and contemporaneity of cultures there, enhancing the importance of Hathnora as a rare precious site. In this context, the maximum likelihood classification using digital interpretation techniques was carried out for this study area using the satellite imagery from Landsat ETM+ for the year 2006 and Landsat TM (OLI and TIRS) for the year 2016. The overall accuracy of Land Use Land Cover (LULC) classification of 2016 imagery was around 77.27% based on ground truth data. The significant reduction in the main river course and agricultural activities and increase in the built-up area observed in remote sensing data analysis are undoubtedly the outcome of human encroachments in the vicinity of the eminent heritage site.

Keywords: cultural succession, digital interpretation, Hathnora, Homo Sapiens, Late Acheulian, Middle Palaeolithic

Procedia PDF Downloads 136
1867 Fighting Competition Stress by Focusing the Psychological Training on the Vigor-Activity Mood States

Authors: Majid Al-Busafi, Alexe Cristina Ioana, Alexe Dan Iulian

Abstract:

The specific competition and pre-competition stress in professional track and field determined an increasing engagement, from a biological and psychological point of view, of the middle distance and long distance runners, to obtain the top performances that would get them to win in a competition. Under these conditions, if the psychological stress is not properly managed, the negative effects can lead to a total drop in self-confidence, and can affect the value, the talent, and the self-trust, which generates an even higher stress. One of the means at our disposal is the psychological training, specially adapted to the athlete's individual characteristics, to the characteristics of the athletic event, or of the competition. This paper aims to highlight certain original aspects regarding the effects of a specific psychological training program on the mood states characterized by psychological activation, vigor, vitality. The subjects were represented by 12 professional middle distance and long distance runners, subjected to an applicative intervention to which they have participated voluntarily, over the course of 6 months (a competition season). The results indicated that The application of a psychological training program, adapted to the track and field competition system, over a period of time characterized by high competition stress, can determine an increase in the states of vigor and psychological activation, at the same time diminishing those moods that have negative effects on the performance, in the middle distance and long distance running events. This conclusion confirms the hypothesis of this research.

Keywords: competition stress, psychological training, track and field, vigor-activity

Procedia PDF Downloads 423
1866 Successful Management of a Boy with Mild Persistent Asthma: A Longitudinal Case

Authors: A. Lubis, L. Setiawati, A. R. Setyoningrum, A. Suryawan, Irwanto

Abstract:

Asthma is a condition that causing chronic health problems in children. In addition to basic therapy against disease, we must try to reduce the impact of chronic health problems and also optimize their medical aspect of growth and development. A boy with mild asthma attack frequent episode did not showed any improvement with medical treatment and his asthma control test was 11. From radiologic examination he got hyperaerated lung and billateral sinusitis maxillaris; skin test results were house dust, food and pet allergy; an overweight body; bad school grades; psychological and environmental problem. We followed and evaluated this boy in 6 months, treated holistically. Even we could not do much on environmental but no more psychological and school problems, his on a good bodyweight and his asthma control test was 22. A case of a child with mild asthma attack frequent episode was reported. Asthma clinical course show no significant improvement when other predisposing factor is not well-controlled and a child’s growth and development may be affected. Improving condition of the patient can be created with the help of loving and caring way of nurturing from the parents and supportive peer group. Therefore, continuous and consistent monitoring is required because prognosis of asthma is generally good when regularly and properly controlled.

Keywords: asthma, chronic health problems, growth, development

Procedia PDF Downloads 203
1865 Exploring Subjective Simultaneous Mixed Emotion Experiences in Middle Childhood

Authors: Esther Burkitt

Abstract:

Background: Evidence is mounting that mixed emotions can be experienced simultaneously in different ways across the lifespan. Four types of patterns of simultaneously mixed emotions (sequential, prevalent, highly parallel, and inverse types) have been identified in middle childhood and adolescence. Moreover, the recognition of these experiences tends to develop firstly when children consider peers rather than the self. This evidence from children and adolescents is based on examining the presence of experiences specified in adulthood. The present study, therefore, applied an exhaustive coding scheme to investigate whether children experience types of previously unidentified simultaneous mixed emotional experiences. Methodology: One hundred and twenty children (60 girls) aged 7 years 1 month - 9 years 2 months (X=8 years 1 month; SD = 10 months) were recruited from mainstream schools across the UK. Two age groups were formed (youngest, n = 61, 7 years 1 month- 8 years 1 months: oldest, n = 59, 8 years 2 months – 9 years 2 months) and allocated to one of two conditions hearing vignettes describing happy and sad mixed emotion events in age and gender-matched protagonist or themselves. Results: Loglinear analyses identified new types of flexuous, vertical, and other experiences along with established sequential, prevalent, highly parallel, and inverse types of experience. Older children recognised more complex experiences other than the self-condition. Conclusion: Several additional types of simultaneously mixed emotions are recognised in middle childhood. The theoretical relevance of simultaneous mixed emotion processing in childhood is considered, and the potential utility of the findings in emotion assessments is discussed.

Keywords: emotion, childhood, self, other

Procedia PDF Downloads 44
1864 The Shadow of Terrorism in the World Tourism Industry: Impacts, Prevention and Recovery Strategies

Authors: Maria Brás

Abstract:

The main purpose of the presentation is to identify the impacts and appropriate measures to prevent potential attacks, or minimize the risk of an attack in tourist destination. Terrorism has been growing in the shadow of unpredictability, however, is possible to minimize the danger of a terrorist attack by doing the: (1) recognition; (2); evaluation; (3) avoidance; (4) threat reduction. The vulnerability of tourism industry to terrorism is an undeniable fact, and terrorists know it. They use this advantage attacking tourists for very specific reasons, such as the: (1) international coverage by the media, “if it bleeds it leads” ; (2) chances of getting different nationalities at the same place and time; (3) possibility of destroyed the economy of a destination, or destinations (“terrorism contamination effect”), through the reduction of tourist demand; (4) psychological, and social disruption based on fear of negative consequences. Security incidents, such as terrorism, include different preventive measures that can be conducted in partnership with: tourism industry (hotels, airports, tourist attractions, among others); central government; public and/or private sector; local community; and media. The recovery strategies must be based on the dissemination of positive information to the media; in creating new marketing strategies that emphasize the social and cultural values of the destination; encourage domestic tourism; get government, or state, financial support.

Keywords: terrorism, tourism, safety, security, impacts, prevention, recovery

Procedia PDF Downloads 312
1863 An MrPPG Method for Face Anti-Spoofing

Authors: Lan Zhang, Cailing Zhang

Abstract:

In recent years, many face anti-spoofing algorithms have high detection accuracy when detecting 2D face anti-spoofing or 3D mask face anti-spoofing alone in the field of face anti-spoofing, but their detection performance is greatly reduced in multidimensional and cross-datasets tests. The rPPG method used for face anti-spoofing uses the unique vital information of real face to judge real faces and face anti-spoofing, so rPPG method has strong stability compared with other methods, but its detection rate of 2D face anti-spoofing needs to be improved. Therefore, in this paper, we improve an rPPG(Remote Photoplethysmography) method(MrPPG) for face anti-spoofing which through color space fusion, using the correlation of pulse signals between real face regions and background regions, and introducing the cyclic neural network (LSTM) method to improve accuracy in 2D face anti-spoofing. Meanwhile, the MrPPG also has high accuracy and good stability in face anti-spoofing of multi-dimensional and cross-data datasets. The improved method was validated on Replay-Attack, CASIA-FASD, Siw and HKBU_MARs_V2 datasets, the experimental results show that the performance and stability of the improved algorithm proposed in this paper is superior to many advanced algorithms.

Keywords: face anti-spoofing, face presentation attack detection, remote photoplethysmography, MrPPG

Procedia PDF Downloads 142
1862 Leading, Teaching and Learning “in the Middle”: Experiences, Beliefs, and Values of Instructional Leaders, Teachers, and Students in Finland, Germany, and Canada

Authors: Brandy Yee, Dianne Yee

Abstract:

Through the exploration of the lived experiences, beliefs and values of instructional leaders, teachers and students in Finland, Germany and Canada, we investigated the factors which contribute to developmentally responsive, intellectually engaging middle-level learning environments for early adolescents. Student-centred leadership dimensions, effective instructional practices and student agency were examined through the lens of current policy and research on middle-level learning environments emerging from the Canadian province of Manitoba. Consideration of these three research perspectives in the context of early adolescent learning, placed against an international backdrop, provided a previously undocumented perspective on leading, teaching and learning in the middle years. Aligning with a social constructivist, qualitative research paradigm, the study incorporated collective case study methodology, along with constructivist grounded theory methods of data analysis. Data were collected through semi-structured individual and focus group interviews and document review, as well as direct and participant observation. Three case study narratives were developed to share the rich stories of study participants, who had been selected using maximum variation and intensity sampling techniques. Interview transcript data were coded using processes from constructivist grounded theory. A cross-case analysis yielded a conceptual framework highlighting key factors that were found to be significant in the establishment of developmentally responsive, intellectually engaging middle-level learning environments. Seven core categories emerged from the cross-case analysis as common to all three countries. Within the visual conceptual framework (which depicts the interconnected nature of leading, teaching and learning in middle-level learning environments), these seven core categories were grouped into Essential Factors (student agency, voice and choice), Contextual Factors (instructional practices; school culture; engaging families and the community), Synergistic Factors (instructional leadership) and Cornerstone Factors (education as a fundamental cultural value; preservice, in-service and ongoing teacher development). In addition, sub-factors emerged from recurring codes in the data and identified specific characteristics and actions found in developmentally responsive, intellectually engaging middle-level learning environments. Although this study focused on 12 schools in Finland, Germany and Canada, it informs the practice of educators working with early adolescent learners in middle-level learning environments internationally. The authentic voices of early adolescent learners are the most important resource educators have to gauge if they are creating effective learning environments for their students. Ongoing professional dialogue and learning is essential to ensure teachers are supported in their work and develop the pedagogical practices needed to meet the needs of early adolescent learners. It is critical to balance consistency, coherence and dependability in the school environment with the necessary flexibility in order to support the unique learning needs of early adolescents. Educators must intentionally create a school culture that unites teachers, students and their families in support of a common purpose, as well as nurture positive relationships between the school and its community. A large, urban school district in Canada has implemented a school cohort-based model to begin to bring developmentally responsive, intellectually engaging middle-level learning environments to scale.

Keywords: developmentally responsive learning environments, early adolescents, middle level learning, middle years, instructional leadership, instructional practices, intellectually engaging learning environments, leadership dimensions, student agency

Procedia PDF Downloads 277