CINXE.COM
Search results for: smudge attack
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: smudge attack</title> <meta name="description" content="Search results for: smudge attack"> <meta name="keywords" content="smudge attack"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="smudge attack" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="smudge attack"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 619</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: smudge attack</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">349</span> The Impact of Artificial Intelligence on Human Rights Legislations and Evolution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shenouda%20Farag%20Aziz%20Ibrahim">Shenouda Farag Aziz Ibrahim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The relationship between terrorism and human rights has become an important issue in the fight against terrorism worldwide. This is based on the fact that terrorism and human rights are closely linked, so that when the former begins, the latter suffers. This direct link was recognized in the Vienna Declaration and Program of Action adopted by the International Conference on Human Rights held in Vienna on 25 June 1993, which recognized that terrorist acts aim to violate human rights in all their forms and manifestations. . Therefore, terrorism represents an attack on fundamental human rights. For this purpose, the first part of this article focuses on the relationship between terrorism and human rights and aims to show the relationship between these two concepts. In the second part, the concept of cyber threat and its manifestations are discussed. An analysis of the fight against terrorism in the context of human rights was also made.. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=sustainable%20development" title="sustainable development">sustainable development</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20rights" title=" human rights"> human rights</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20right%20to%20development" title=" the right to development"> the right to development</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20human%20rights-based%20approach%20to%20development" title=" the human rights-based approach to development"> the human rights-based approach to development</a>, <a href="https://publications.waset.org/abstracts/search?q=environmental%20rights" title=" environmental rights"> environmental rights</a>, <a href="https://publications.waset.org/abstracts/search?q=economic%20development" title=" economic development"> economic development</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20sustainability%20human%20rights%20protection" title=" social sustainability human rights protection"> social sustainability human rights protection</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20rights%20violations" title=" human rights violations"> human rights violations</a>, <a href="https://publications.waset.org/abstracts/search?q=workers%E2%80%99%20rights" title=" workers’ rights"> workers’ rights</a>, <a href="https://publications.waset.org/abstracts/search?q=justice" title=" justice"> justice</a>, <a href="https://publications.waset.org/abstracts/search?q=security." title=" security."> security.</a> </p> <a href="https://publications.waset.org/abstracts/186496/the-impact-of-artificial-intelligence-on-human-rights-legislations-and-evolution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/186496.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">38</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">348</span> A POX Controller Module to Prepare a List of Flow Header Information Extracted from SDN Traffic</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wisam%20H.%20Muragaa">Wisam H. Muragaa</a>, <a href="https://publications.waset.org/abstracts/search?q=Kamaruzzaman%20Seman"> Kamaruzzaman Seman</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohd%20Fadzli%20Marhusin"> Mohd Fadzli Marhusin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Software Defined Networking (SDN) is a paradigm designed to facilitate the way of controlling the network dynamically and with more agility. Network traffic is a set of flows, each of which contains a set of packets. In SDN, a matching process is performed on every packet coming to the network in the SDN switch. Only the headers of the new packets will be forwarded to the SDN controller. In terminology, the flow header fields are called tuples. Basically, these tuples are 5-tuple: the source and destination IP addresses, source and destination ports, and protocol number. This flow information is used to provide an overview of the network traffic. Our module is meant to extract this 5-tuple with the packets and flows numbers and show them as a list. Therefore, this list can be used as a first step in the way of detecting the DDoS attack. Thus, this module can be considered as the beginning stage of any flow-based DDoS detection method. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=matching" title="matching">matching</a>, <a href="https://publications.waset.org/abstracts/search?q=OpenFlow%20tables" title=" OpenFlow tables"> OpenFlow tables</a>, <a href="https://publications.waset.org/abstracts/search?q=POX%20controller" title=" POX controller"> POX controller</a>, <a href="https://publications.waset.org/abstracts/search?q=SDN" title=" SDN"> SDN</a>, <a href="https://publications.waset.org/abstracts/search?q=table-miss" title=" table-miss"> table-miss</a> </p> <a href="https://publications.waset.org/abstracts/82653/a-pox-controller-module-to-prepare-a-list-of-flow-header-information-extracted-from-sdn-traffic" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/82653.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">199</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">347</span> Numerical Simulation of the Flow around Wing-In-Ground Effect (WIG) Craft</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20Elbatran">A. Elbatran</a>, <a href="https://publications.waset.org/abstracts/search?q=Y.%20Ahmed"> Y. Ahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Radwan"> A. Radwan</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Ishak"> M. Ishak</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The use of WIG craft is representing an ambitious technology that will support in reducing time, effort, and money of the conventional marine transportation in the future. This paper investigates the aerodynamic characteristic of compound wing-in-ground effect (WIG) craft model. Drag coefficient, lift coefficient and Lift and drag ratio were studied numerically with respect to the ground clearance and the wing angle of attack. The modifications of the wing has been done in order to investigate the most suitable wing configuration that can increase the wing lift-to-drag ratio at low ground clearance. A numerical investigation was carried out in this research work using finite volume Reynolds-Averaged Navier-Stokes Equations (RANSE) code ANSYS CFX, Validation was carried out by using experiments. The experimental and the numerical results concluded that the lift to drag ratio decreased with the increasing of the ground clearance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=drag%20Coefficient" title="drag Coefficient">drag Coefficient</a>, <a href="https://publications.waset.org/abstracts/search?q=ground%20clearance" title=" ground clearance"> ground clearance</a>, <a href="https://publications.waset.org/abstracts/search?q=navier-stokes" title=" navier-stokes"> navier-stokes</a>, <a href="https://publications.waset.org/abstracts/search?q=WIG" title=" WIG"> WIG</a> </p> <a href="https://publications.waset.org/abstracts/62997/numerical-simulation-of-the-flow-around-wing-in-ground-effect-wig-craft" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/62997.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">380</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">346</span> Scouring Rate Pattern/Monitoring at Coastal and Offshore Structures</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmad%20Saifullah%20Mazlan">Ahmad Saifullah Mazlan</a>, <a href="https://publications.waset.org/abstracts/search?q=Hossein%20Basser"> Hossein Basser</a>, <a href="https://publications.waset.org/abstracts/search?q=Shatirah%20Akib"> Shatirah Akib</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Scouring pattern evaluation and measuring its depth around coastal and offshore structures is very essential issue to assure the safety of the structures as well as providing needed design parameters. Scouring is known as one of the important phenomena which threatens the safety of infrastructures. Several countermeasures have been developed to control scouring by protecting the structures against water flow attack directly or indirectly by changing the water flow pattern. Recently, monitoring methods for estimating water flow pattern and scour depth are studied to track the safety of structures. Since most of studies regarding scouring is related to monitoring scouring around piers in rivers therefore it is necessary to develop researches investigating scouring around piers in coastal and offshore areas. This paper describes a review of monitoring methods may be used for detecting scour depth around piers in coastal and offshore structures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=scour" title="scour">scour</a>, <a href="https://publications.waset.org/abstracts/search?q=monitoring" title=" monitoring"> monitoring</a>, <a href="https://publications.waset.org/abstracts/search?q=pier" title=" pier"> pier</a>, <a href="https://publications.waset.org/abstracts/search?q=coastal" title=" coastal"> coastal</a>, <a href="https://publications.waset.org/abstracts/search?q=offshore" title=" offshore"> offshore</a> </p> <a href="https://publications.waset.org/abstracts/23145/scouring-rate-patternmonitoring-at-coastal-and-offshore-structures" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23145.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">644</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">345</span> Security in Resource Constraints Network Light Weight Encryption for Z-MAC</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mona%20Almansoori">Mona Almansoori</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Mustafa"> Ahmed Mustafa</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmad%20Elshamy"> Ahmad Elshamy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=hybrid%20MAC%20protocol" title="hybrid MAC protocol">hybrid MAC protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20integrity" title=" data integrity"> data integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=lightweight%20encryption" title=" lightweight encryption"> lightweight encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=neighbor%20based%20key%20sharing" title=" neighbor based key sharing"> neighbor based key sharing</a>, <a href="https://publications.waset.org/abstracts/search?q=sensor%20node%20dataprocessing" title=" sensor node dataprocessing"> sensor node dataprocessing</a>, <a href="https://publications.waset.org/abstracts/search?q=Z-MAC" title=" Z-MAC"> Z-MAC</a> </p> <a href="https://publications.waset.org/abstracts/128077/security-in-resource-constraints-network-light-weight-encryption-for-z-mac" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/128077.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">144</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">344</span> Saliency Detection Using a Background Probability Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Junling%20Li">Junling Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Fang%20Meng"> Fang Meng</a>, <a href="https://publications.waset.org/abstracts/search?q=Yichun%20Zhang"> Yichun Zhang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Image saliency detection has been long studied, while several challenging problems are still unsolved, such as detecting saliency inaccurately in complex scenes or suppressing salient objects in the image borders. In this paper, we propose a new saliency detection algorithm in order to solving these problems. We represent the image as a graph with superixels as nodes. By considering appearance similarity between the boundary and the background, the proposed method chooses non-saliency boundary nodes as background priors to construct the background probability model. The probability that each node belongs to the model is computed, which measures its similarity with backgrounds. Thus we can calculate saliency by the transformed probability as a metric. We compare our algorithm with ten-state-of-the-art salient detection methods on the public database. Experimental results show that our simple and effective approach can attack those challenging problems that had been baffling in image saliency detection. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=visual%20saliency" title="visual saliency">visual saliency</a>, <a href="https://publications.waset.org/abstracts/search?q=background%20probability" title=" background probability"> background probability</a>, <a href="https://publications.waset.org/abstracts/search?q=boundary%20knowledge" title=" boundary knowledge"> boundary knowledge</a>, <a href="https://publications.waset.org/abstracts/search?q=background%20priors" title=" background priors"> background priors</a> </p> <a href="https://publications.waset.org/abstracts/13729/saliency-detection-using-a-background-probability-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/13729.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">429</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">343</span> Effect of Runup over a Vertical Pile Supported Caisson Breakwater and Quarter Circle Pile Supported Caisson Breakwater</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=T.%20J.%20Jemi%20Jeya">T. J. Jemi Jeya</a>, <a href="https://publications.waset.org/abstracts/search?q=V.%20Sriram"> V. Sriram</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Pile Supported Caisson breakwater is an ecofriendly breakwater very useful in coastal zone protection. The model is developed by considering the advantages of both caisson breakwater and pile supported breakwater, where the top portion is a vertical or quarter circle caisson and the bottom portion consists of a pile supported breakwater defined as Vertical Pile Supported Breakwater (VPSCB) and Quarter-circle Pile Supported Breakwater (QPSCB). The study mainly focuses on comparison of run up over VPSCB and QPSCB under oblique waves. The experiments are carried out in a shallow wave basin under different water depths (d = 0.5 m & 0.55 m) and under different oblique regular waves (0<sup>0</sup>, 15<sup>0</sup>, 30<sup>0</sup>). The run up over the surface is measured by placing two run up probes over the surface at 0.3 m on both sides from the centre of the model. The results show that the non-dimensional shoreward run up shows slight decrease with respect to increase in angle of wave attack. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Caisson%20breakwater" title="Caisson breakwater">Caisson breakwater</a>, <a href="https://publications.waset.org/abstracts/search?q=pile%20supported%20breakwater" title=" pile supported breakwater"> pile supported breakwater</a>, <a href="https://publications.waset.org/abstracts/search?q=quarter%20circle%20breakwater" title=" quarter circle breakwater"> quarter circle breakwater</a>, <a href="https://publications.waset.org/abstracts/search?q=vertical%20breakwater" title=" vertical breakwater"> vertical breakwater</a> </p> <a href="https://publications.waset.org/abstracts/111802/effect-of-runup-over-a-vertical-pile-supported-caisson-breakwater-and-quarter-circle-pile-supported-caisson-breakwater" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/111802.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">153</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">342</span> Effect of Design Parameters on a Two Stage Launch Vehicle Performance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Assem%20Sallam">Assem Sallam</a>, <a href="https://publications.waset.org/abstracts/search?q=Aly%20Elzahaby"> Aly Elzahaby</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Makled"> Ahmed Makled</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Khalil"> Mohamed Khalil</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Change in design parameters of launch vehicle affects its overall flight path trajectory. In this paper, several design parameters are introduced to study their effect. Selected parameters are the launch vehicle mass, which is presented in the form of payload mass, the maximum allowable angle of attack the launch vehicle can withstand, the flight path angle that is predefined for the launch vehicle second stage, the required inclination and its effect on the launch azimuth and finally by changing the launch pad coordinate. Selected design parameters are studied for their effect on the variation of altitude, ground range, absolute velocity and the flight path angle. The study gives a general mean of adjusting the design parameters to reach the required launch vehicle performance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=launch%20vehicle%20azimuth" title="launch vehicle azimuth">launch vehicle azimuth</a>, <a href="https://publications.waset.org/abstracts/search?q=launch%20vehicle%20trajectory" title=" launch vehicle trajectory"> launch vehicle trajectory</a>, <a href="https://publications.waset.org/abstracts/search?q=launch%20vehicle%20payload" title=" launch vehicle payload"> launch vehicle payload</a>, <a href="https://publications.waset.org/abstracts/search?q=launch%20pad%20location" title=" launch pad location"> launch pad location</a> </p> <a href="https://publications.waset.org/abstracts/75171/effect-of-design-parameters-on-a-two-stage-launch-vehicle-performance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/75171.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">312</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">341</span> The Implementation of Information Security Audits in Public Sector: Perspective from Indonesia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nur%20Imroatun%20Sholihat">Nur Imroatun Sholihat</a>, <a href="https://publications.waset.org/abstracts/search?q=Gresika%20Bunga%20Sylvana"> Gresika Bunga Sylvana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Currently, cyber attack became an incredibly serious problem due to its increasing trend all over the world. Therefore, information security becomes prominent for every organization including public sector organization. In Indonesia, unfortunately, Ministry of Finance (MoF) is the only public sector organization that has already formally established procedure to assess its information security adequacy by performing information security audits (November 2017). We assess the implementation of information security audits in the MoF using qualitative data obtained by interviewing IT auditors and by analysis of related documents. For this reason, information security audit practice in the MoF could become the acceptable benchmark for all other public sector organizations in Indonesia. This study is important because, to the best of the author’s knowledge, our research into information security audits practice in Indonesia’s public sector have not been found yet. Results showed that information security audits performed mostly by doing pentest (penetration testing) to MoF’s critical applications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20security%20audit" title="information security audit">information security audit</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20technology" title=" information technology"> information technology</a>, <a href="https://publications.waset.org/abstracts/search?q=Ministry%20of%20Finance%20of%20Indonesia" title=" Ministry of Finance of Indonesia"> Ministry of Finance of Indonesia</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20sector%20organization" title=" public sector organization"> public sector organization</a> </p> <a href="https://publications.waset.org/abstracts/87165/the-implementation-of-information-security-audits-in-public-sector-perspective-from-indonesia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/87165.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">237</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">340</span> New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mehmet%20Kargaci">Mehmet Kargaci</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20war" title="cyber war">cyber war</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20threats" title=" cyber threats"> cyber threats</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20operation%20capabilities" title=" cyber operation capabilities"> cyber operation capabilities</a>, <a href="https://publications.waset.org/abstracts/search?q=operation%20planning" title=" operation planning"> operation planning</a> </p> <a href="https://publications.waset.org/abstracts/31541/new-requirements-of-the-fifth-dimension-of-war-planning-of-cyber-operation-capabilities" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31541.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">335</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">339</span> Wireless Sensor Anomaly Detection Using Soft Computing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mouhammd%20Alkasassbeh">Mouhammd Alkasassbeh</a>, <a href="https://publications.waset.org/abstracts/search?q=Alaa%20Lasasmeh"> Alaa Lasasmeh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We live in an era of rapid development as a result of significant scientific growth. Like other technologies, wireless sensor networks (WSNs) are playing one of the main roles. Based on WSNs, ZigBee adds many features to devices, such as minimum cost and power consumption, and increasing the range and connect ability of sensor nodes. ZigBee technology has come to be used in various fields, including science, engineering, and networks, and even in medicinal aspects of intelligence building. In this work, we generated two main datasets, the first being based on tree topology and the second on star topology. The datasets were evaluated by three machine learning (ML) algorithms: J48, meta.j48 and multilayer perceptron (MLP). Each topology was classified into normal and abnormal (attack) network traffic. The dataset used in our work contained simulated data from network simulation 2 (NS2). In each database, the Bayesian network meta.j48 classifier achieved the highest accuracy level among other classifiers, of 99.7% and 99.2% respectively. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=IDS" title="IDS">IDS</a>, <a href="https://publications.waset.org/abstracts/search?q=Machine%20learning" title=" Machine learning"> Machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=WSN" title=" WSN"> WSN</a>, <a href="https://publications.waset.org/abstracts/search?q=ZigBee%20technology" title=" ZigBee technology"> ZigBee technology</a> </p> <a href="https://publications.waset.org/abstracts/50660/wireless-sensor-anomaly-detection-using-soft-computing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50660.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">543</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">338</span> The Impact of a Leadership Change on Individuals' Behaviour and Incentives: Evidence from the Top Tier Italian Football League</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kaori%20Narita">Kaori Narita</a>, <a href="https://publications.waset.org/abstracts/search?q=Juan%20de%20Dios%20Tena%20Horrillo"> Juan de Dios Tena Horrillo</a>, <a href="https://publications.waset.org/abstracts/search?q=Claudio%20Detotto"> Claudio Detotto</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Decisions on replacement of leaders are of significance and high prevalence in any organization, and concerns many of its stakeholders, whether it is a leader in a political party or a CEO of a firm, as indicated by high media coverage of such events. This merits an investigation into the consequences and implications of a leadership change on the performances and behavior of organizations and their workers. Sport economics provides a fruitful field to explore these issues due to the high frequencies of managerial changes in professional sports clubs and the transparency and regularity of observations of team performance and players’ abilities. Much of the existing research on managerial change focuses on how this affects the performance of an organization. However, there is scarcely attention paid to the consequences of such events on the behavior of individuals within the organization. Changes in behavior and attitudes of a group of workers due to a managerial change could be of great interest in management science, psychology, and operational research. On the other hand, these changes cannot be observed in the final outcome of the organization, as this is affected by many other unobserved shocks, for example, the stress level of workers with the need to deal with a difficult situation. To fill this gap, this study shows the first attempt to evaluate the impact of managerial change on players’ behaviors such as attack intensity, aggressiveness, and efforts. The data used in this study is from the top tier Italian football league (“Serie A”), where an average of 13 within season replacements of head coaches were observed over the period of seasons from 2000/2001 to 2017/18. The preliminary estimation employs Pooled Ordinary Least Square (POLS) and club-season Fixed Effect (FE) in order to assess the marginal effect of having a new manager on the number of shots, corners and red/yellow cards after controlling for a home-field advantage, ex ante abilities and current positions in the league of a team and their opponent. The results from this preliminary estimation suggest that the teams do not show a significant difference in their behaviors before and after the managerial change. To build on these preliminary results, other methods, including propensity score matching and non-linear model estimates, will be used. Moreover, the study will further investigate these issues by considering other measurements of attack intensity, aggressiveness, and efforts, such as possessions, a number of fouls and the athletic performance of players, respectively. Finally, the study is going to investigate whether these results vary over the characteristics of a new head coach, for example, their age and experience as a manager and a player. Thus far, this study suggests that certain behaviours of individuals in an organisation are not immediately affected by a change in leadership. To confirm this preliminary finding and lead to a more solid conclusion, further investigation will be conducted in the aforementioned manner, and the results will be elaborated in the conference. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=behaviour" title="behaviour">behaviour</a>, <a href="https://publications.waset.org/abstracts/search?q=effort" title=" effort"> effort</a>, <a href="https://publications.waset.org/abstracts/search?q=manager%20characteristics" title=" manager characteristics"> manager characteristics</a>, <a href="https://publications.waset.org/abstracts/search?q=managerial%20change" title=" managerial change"> managerial change</a>, <a href="https://publications.waset.org/abstracts/search?q=sport%20economics" title=" sport economics"> sport economics</a> </p> <a href="https://publications.waset.org/abstracts/106112/the-impact-of-a-leadership-change-on-individuals-behaviour-and-incentives-evidence-from-the-top-tier-italian-football-league" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/106112.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">134</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">337</span> Effect of Heat Treatment on the Corrosion Behavior of Stainless Steel</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Altoumi%20Alndalusi">Altoumi Alndalusi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The work examines the aqueous corrosion behavior of grades of stain less steel which are used as corrosion resistant castings for applications such as valve and pump bodies. The corrosion behavior of steels in the as-cast condition has been examined using potentiostatic studies to illustrate the need for correct thermal treatment. A metallurgical examination and chemical analysis were carried out to establish the morphology of the steel structure. Heat treatment was carried out in order to compare damage in relation to microstructure. Optical and scanning electron microscopy examinations confirmed that the austenitic steels suffers from severe localized inter-dendritic pitting attack, while non homogenized castings highly alloyed duplex steels gave inferior corrosion resistance. Through the heat treatment conditions a significant of phase transformation of the duplex steel C were occurred (from ferrite to austenite and sigma plus carbides) and were gave reduction resistance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cast" title="cast">cast</a>, <a href="https://publications.waset.org/abstracts/search?q=corrosion" title=" corrosion"> corrosion</a>, <a href="https://publications.waset.org/abstracts/search?q=duplex%20stainless" title=" duplex stainless"> duplex stainless</a>, <a href="https://publications.waset.org/abstracts/search?q=heat%20treatment" title=" heat treatment"> heat treatment</a>, <a href="https://publications.waset.org/abstracts/search?q=material" title=" material"> material</a>, <a href="https://publications.waset.org/abstracts/search?q=steel" title=" steel"> steel</a> </p> <a href="https://publications.waset.org/abstracts/80060/effect-of-heat-treatment-on-the-corrosion-behavior-of-stainless-steel" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/80060.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">175</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">336</span> Deradicalization for Former Terrorists through Entrepreneurship Program</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jamal%20Wiwoho">Jamal Wiwoho</a>, <a href="https://publications.waset.org/abstracts/search?q=Pujiyono"> Pujiyono</a>, <a href="https://publications.waset.org/abstracts/search?q=Triyanto"> Triyanto</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Terrorism is a real enemy for all countries, including Indonesia. Bomb attacks in some parts of Indonesia are proof that Indonesia has serious problems with terrorism. Perpetrators of terror are arrested and imprisoned, and some of them were executed. However, this method did not succeed in stopping the terrorist attacks. Former terrorists continue to carry out bomb attacks. Therefore, this paper proposes a program towards deradicalization efforts of former terrorists through entrepreneurship. This is necessary because it is impossible to change their radical ideology. The program is also motivated by understanding that terrorists generally come from poor families. This program aims to occupy their time with business activities so there is no time to plan and carry out bomb attacks. This research is an empirical law study. Data were collected by literature study, observation, and in-depth interviews. Data were analyzed with the Miles and Huberman interactive model. The results show that the entrepreneurship program is effective to prevent terrorist attack. Former terrorists are busy with their business. Therefore, they have no time to carry out bomb attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=deradicalization" title="deradicalization">deradicalization</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorists" title=" terrorists"> terrorists</a>, <a href="https://publications.waset.org/abstracts/search?q=entrepreneurship" title=" entrepreneurship"> entrepreneurship</a> </p> <a href="https://publications.waset.org/abstracts/83652/deradicalization-for-former-terrorists-through-entrepreneurship-program" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/83652.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">271</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">335</span> Machine Learning Approach for Anomaly Detection in the Simulated Iec-60870-5-104 Traffic</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Stepan%20Grebeniuk">Stepan Grebeniuk</a>, <a href="https://publications.waset.org/abstracts/search?q=Ersi%20Hodo"> Ersi Hodo</a>, <a href="https://publications.waset.org/abstracts/search?q=Henri%20Ruotsalainen"> Henri Ruotsalainen</a>, <a href="https://publications.waset.org/abstracts/search?q=Paul%20Tavolato"> Paul Tavolato</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Substation security plays an important role in the power delivery system. During the past years, there has been an increase in number of attacks on automation networks of the substations. In spite of that, there hasn’t been enough focus dedicated to the protection of such networks. Aiming to design a specialized anomaly detection system based on machine learning, in this paper we will discuss the IEC 60870-5-104 protocol that is used for communication between substation and control station and focus on the simulation of the substation traffic. Firstly, we will simulate the communication between substation slave and server. Secondly, we will compare the system's normal behavior and its behavior under the attack, in order to extract the right features which will be needed for building an anomaly detection system. Lastly, based on the features we will suggest the anomaly detection system for the asynchronous protocol IEC 60870-5-104. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anomaly%20detection" title="Anomaly detection">Anomaly detection</a>, <a href="https://publications.waset.org/abstracts/search?q=IEC-60870-5-104" title=" IEC-60870-5-104"> IEC-60870-5-104</a>, <a href="https://publications.waset.org/abstracts/search?q=Machine%20learning" title=" Machine learning"> Machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=Man-in-the-Middle%20attacks" title=" Man-in-the-Middle attacks"> Man-in-the-Middle attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=Substation%20security" title=" Substation security"> Substation security</a> </p> <a href="https://publications.waset.org/abstracts/66169/machine-learning-approach-for-anomaly-detection-in-the-simulated-iec-60870-5-104-traffic" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/66169.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">368</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">334</span> FLEX: A Backdoor Detection and Elimination Method in Federated Scenario</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shuqi%20Zhang">Shuqi Zhang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Federated learning allows users to participate in collaborative model training without sending data to third-party servers, reducing the risk of user data privacy leakage, and is widely used in smart finance and smart healthcare. However, the distributed architecture design of federation learning itself and the existence of secure aggregation protocols make it inherently vulnerable to backdoor attacks. To solve this problem, the federated learning backdoor defense framework FLEX based on group aggregation, cluster analysis, and neuron pruning is proposed, and inter-compatibility with secure aggregation protocols is achieved. The good performance of FLEX is verified by building a horizontal federated learning framework on the CIFAR-10 dataset for experiments, which achieves 98% success rate of backdoor detection and reduces the success rate of backdoor tasks to 0% ~ 10%. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=federated%20learning" title="federated learning">federated learning</a>, <a href="https://publications.waset.org/abstracts/search?q=secure%20aggregation" title=" secure aggregation"> secure aggregation</a>, <a href="https://publications.waset.org/abstracts/search?q=backdoor%20attack" title=" backdoor attack"> backdoor attack</a>, <a href="https://publications.waset.org/abstracts/search?q=cluster%20analysis" title=" cluster analysis"> cluster analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=neuron%20pruning" title=" neuron pruning"> neuron pruning</a> </p> <a href="https://publications.waset.org/abstracts/158139/flex-a-backdoor-detection-and-elimination-method-in-federated-scenario" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/158139.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">96</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">333</span> Plasma Actuator Application to Control Surfaces of a Model Aircraft</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yuta%20Moriyama">Yuta Moriyama</a>, <a href="https://publications.waset.org/abstracts/search?q=Etsuo%20Morishita"> Etsuo Morishita</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Plasma actuator is very effective to recover stall flows over an upper airfoil surface. We first manufacture the actuator, test the stability of the device by trial and error basis and find the conditions for steady operations. We visualize the flow around an airfoil in the smoke tunnel and observe the stall recovery. The plasma actuator is stationary device and has no moving parts, and it might be an ideal device to control a model aircraft. We can use the actuator not only as a stall recovery device but also as a spoiler. We put the actuator near the leading edge of an elevator of a model aircraft as a spoiler, and measure the aerodynamic forces by a three-component balance. We observe the effect of the plasma actuator on the aerodynamic forces and the device effectiveness changes depending on the angle of attack whether it is positive or negative. We also visualize the flow caused by the plasma actuator by a desk-top Schlieren photography which is otherwise very difficult in a low-speed wind tunnel experiment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=aerodynamics" title="aerodynamics">aerodynamics</a>, <a href="https://publications.waset.org/abstracts/search?q=plasma%20actuator" title=" plasma actuator"> plasma actuator</a>, <a href="https://publications.waset.org/abstracts/search?q=model%20aircraft" title=" model aircraft"> model aircraft</a>, <a href="https://publications.waset.org/abstracts/search?q=wind%20tunnel" title=" wind tunnel"> wind tunnel</a> </p> <a href="https://publications.waset.org/abstracts/84276/plasma-actuator-application-to-control-surfaces-of-a-model-aircraft" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/84276.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">373</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">332</span> Survey on Malware Detection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Doaa%20Wael">Doaa Wael</a>, <a href="https://publications.waset.org/abstracts/search?q=Naswa%20Abdelbaky"> Naswa Abdelbaky</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=malware%20analysis" title="malware analysis">malware analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain" title=" blockchain"> blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=malware%20attacks" title=" malware attacks"> malware attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=malware%20detection%20approaches" title=" malware detection approaches"> malware detection approaches</a> </p> <a href="https://publications.waset.org/abstracts/164823/survey-on-malware-detection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164823.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">87</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">331</span> An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20Mohammadpour">A. Mohammadpour</a>, <a href="https://publications.waset.org/abstracts/search?q=Ebrahim%20Najafi%20Kajabad"> Ebrahim Najafi Kajabad</a>, <a href="https://publications.waset.org/abstracts/search?q=Ghazale%20Ipakchi"> Ghazale Ipakchi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=intrusion%20detection%20systems" title="intrusion detection systems">intrusion detection systems</a>, <a href="https://publications.waset.org/abstracts/search?q=clustering" title=" clustering"> clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=k-means" title=" k-means"> k-means</a>, <a href="https://publications.waset.org/abstracts/search?q=k-medoids" title=" k-medoids"> k-medoids</a>, <a href="https://publications.waset.org/abstracts/search?q=SV%20clustering" title=" SV clustering"> SV clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=ensemble" title=" ensemble"> ensemble</a> </p> <a href="https://publications.waset.org/abstracts/75738/an-intrusion-detection-systems-based-on-k-means-k-medoids-and-support-vector-clustering-using-ensemble" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/75738.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">221</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">330</span> Management of the Asthma Crisis in the Unit of Intensive Care of the General Hospital of Reference of Kinshasa</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eddy%20K.%20Mukadi">Eddy K. Mukadi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of this study was to provide contributing elements to improve the management of the asthma crisis in the intensive care unit of the General Reference Hospital of Kinshasa. This was a descriptive study of all patients in the intensive care unit presenting with the asthma attack during the period from February 5, 2013 to February 5, 2014. The main data were obtained from consultation registry and medical records. A total of 35 patients, 21 of whom were male (majority) compared to 14 female. Average age of patients was 46.48 plus or minus 16.98 with extremes ranging from 21-75 years. The clinic was dominated by dyspnea in 100% of cases, followed by rales with 91.4% of cases. In spite of the control of the crisis obtained after the treatment with B2 mimetic by inhalation was introduced A 91.5%; 88% corticosteroids; 80% oxygen, the therapeutic principle recommended for the management of asthma attacks was not respected in the majority of cases. This is why we suggest that improving the quality of care to be administered to patients will yield more adequate results. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=asthma%20crisis" title="asthma crisis">asthma crisis</a>, <a href="https://publications.waset.org/abstracts/search?q=intensive%20care" title=" intensive care"> intensive care</a>, <a href="https://publications.waset.org/abstracts/search?q=general%20hospital" title=" general hospital"> general hospital</a>, <a href="https://publications.waset.org/abstracts/search?q=Kinshasa" title=" Kinshasa"> Kinshasa</a> </p> <a href="https://publications.waset.org/abstracts/74128/management-of-the-asthma-crisis-in-the-unit-of-intensive-care-of-the-general-hospital-of-reference-of-kinshasa" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/74128.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">232</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">329</span> Classification of IoT Traffic Security Attacks Using Deep Learning</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anum%20Ali">Anum Ali</a>, <a href="https://publications.waset.org/abstracts/search?q=Kashaf%20ad%20Dooja"> Kashaf ad Dooja</a>, <a href="https://publications.waset.org/abstracts/search?q=Asif%20Saleem"> Asif Saleem</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The future smart cities trend will be towards Internet of Things (IoT); IoT creates dynamic connections in a ubiquitous manner. Smart cities offer ease and flexibility for daily life matters. By using small devices that are connected to cloud servers based on IoT, network traffic between these devices is growing exponentially, whose security is a concerned issue, since ratio of cyber attack may make the network traffic vulnerable. This paper discusses the latest machine learning approaches in related work further to tackle the increasing rate of cyber attacks, machine learning algorithm is applied to IoT-based network traffic data. The proposed algorithm train itself on data and identify different sections of devices interaction by using supervised learning which is considered as a classifier related to a specific IoT device class. The simulation results clearly identify the attacks and produce fewer false detections. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=IoT" title="IoT">IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=traffic%20security" title=" traffic security"> traffic security</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20learning" title=" deep learning"> deep learning</a>, <a href="https://publications.waset.org/abstracts/search?q=classification" title=" classification"> classification</a> </p> <a href="https://publications.waset.org/abstracts/146890/classification-of-iot-traffic-security-attacks-using-deep-learning" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/146890.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">153</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">328</span> Security Risks Assessment: A Conceptualization and Extension of NFC Touch-And-Go Application </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ku%20Aina%20Afiqah%20Ku%20Adzman">Ku Aina Afiqah Ku Adzman</a>, <a href="https://publications.waset.org/abstracts/search?q=Manmeet%20Mahinderjit%20Singh"> Manmeet Mahinderjit Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Zarul%20Fitri%20Zaaba"> Zarul Fitri Zaaba</a> </p> <p class="card-text"><strong>Abstract:</strong></p> NFC operates on low-range 13.56 MHz frequency within a distance from 4cm to 10cm, and the applications can be categorized as touch and go, touch and confirm, touch and connect, and touch and explore. NFC applications are vulnerable to various security and privacy attacks such due to its physical nature; unprotected data stored in NFC tag and insecure communication between its applications. This paper aims to determine the likelihood of security risks happening in an NFC technology and application. We present an NFC technology taxonomy covering NFC standards, types of application and various security and privacy attack. Based on observations and the survey presented to evaluate the risk assessment within the touch and go application demonstrates two security attacks that are high risks namely data corruption and DOS attacks. After the risks are determined, risk countermeasures by using AHP is adopted. The guideline and solutions to these two high risks, attacks are later applied to a secure NFC-enabled Smartphone Attendance System. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Near%20Field%20Communication%20%28NFC%29" title="Near Field Communication (NFC)">Near Field Communication (NFC)</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20%20assessment" title=" risk assessment"> risk assessment</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-criteria%20decision%20making" title=" multi-criteria decision making"> multi-criteria decision making</a>, <a href="https://publications.waset.org/abstracts/search?q=Analytical%20Hierarchy%20Process%20%28AHP%29" title=" Analytical Hierarchy Process (AHP)"> Analytical Hierarchy Process (AHP)</a> </p> <a href="https://publications.waset.org/abstracts/66165/security-risks-assessment-a-conceptualization-and-extension-of-nfc-touch-and-go-application" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/66165.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">302</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">327</span> A Density Functional Theory Study of Metal-Porphyrin Graphene for CO2 Hydration</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Manju%20Verma">Manju Verma</a>, <a href="https://publications.waset.org/abstracts/search?q=Parag%20A.%20Deshpande"> Parag A. Deshpande</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Electronic structure calculations of hydrogen terminated metal-porphyrin graphene were carried out to explore the catalytic activity for CO2 hydration reaction. A ruthenium atom was substituted in place of carbon atom of graphene and ruthenium chelated carbon atoms were replaced by four nitrogen atoms in metal-porphyrin graphene system. Ruthenium atom created the active site for CO2 hydration reaction. Ruthenium-porphyrin graphene followed the mechanism of carbonic anhydrase enzyme for CO2 conversion to HCO3- ion. CO2 hydration reaction over ruthenium-porphyrin graphene proceeded via the elementary steps: OH- formation from H2O dissociation, CO2 bending in presence of nucleophilic attack of OH- ion, HCO3- ion formation from proton migration, HCO3- ion desorption by H2O addition. Proton transfer to yield HCO3- ion was observed as a rate limiting step from free energy landscape. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ruthenium-porphyrin%20graphene" title="ruthenium-porphyrin graphene">ruthenium-porphyrin graphene</a>, <a href="https://publications.waset.org/abstracts/search?q=CO2%20hydration" title=" CO2 hydration"> CO2 hydration</a>, <a href="https://publications.waset.org/abstracts/search?q=carbonic%20anhydrase" title=" carbonic anhydrase"> carbonic anhydrase</a>, <a href="https://publications.waset.org/abstracts/search?q=heterogeneous%20catalyst" title=" heterogeneous catalyst"> heterogeneous catalyst</a>, <a href="https://publications.waset.org/abstracts/search?q=density%20functional%20theory" title=" density functional theory"> density functional theory</a> </p> <a href="https://publications.waset.org/abstracts/60222/a-density-functional-theory-study-of-metal-porphyrin-graphene-for-co2-hydration" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/60222.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">260</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">326</span> Towards Resilient Cloud Computing through Cyber Risk Assessment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hilalah%20Alturkistani">Hilalah Alturkistani</a>, <a href="https://publications.waset.org/abstracts/search?q=Alaa%20AlFaadhel"> Alaa AlFaadhel</a>, <a href="https://publications.waset.org/abstracts/search?q=Nora%20AlJahani"> Nora AlJahani</a>, <a href="https://publications.waset.org/abstracts/search?q=Fatiha%20Djebbar"> Fatiha Djebbar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud computing is one of the most widely used technology which provides opportunities and services to government entities, large companies, and standard users. However, cybersecurity risk management studies of cloud computing and resiliency approaches are lacking. This paper proposes resilient cloud cybersecurity risk assessment and management tailored specifically, to Dropbox with two approaches:1) technical-based solution motivated by a cybersecurity risk assessment of cloud services, and 2)a target personnel-based solution guided by cybersecurity-related survey among employees to identify their knowledge that qualifies them withstand to any cyberattack. The proposed work attempts to identify cloud vulnerabilities, assess threats and detect high risk components, to finally propose appropriate safeguards such as failure predicting and removing, redundancy or load balancing techniques for quick recovery and return to pre-attack state if failure happens. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity%20risk%20management%20plan" title="cybersecurity risk management plan">cybersecurity risk management plan</a>, <a href="https://publications.waset.org/abstracts/search?q=resilient%20cloud%20computing" title=" resilient cloud computing"> resilient cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=cyberattacks" title=" cyberattacks"> cyberattacks</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity%20risk%20assessment" title=" cybersecurity risk assessment "> cybersecurity risk assessment </a> </p> <a href="https://publications.waset.org/abstracts/129761/towards-resilient-cloud-computing-through-cyber-risk-assessment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/129761.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">142</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">325</span> Efficiency Analysis of Trader in Thailand and Laos Border Trade: Case Study of Textile and Garment Products</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Varutorn%20Tulnawat">Varutorn Tulnawat</a>, <a href="https://publications.waset.org/abstracts/search?q=Padcharee%20Phasuk"> Padcharee Phasuk</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper investigates the issue of China’s dumping on border trade between Thailand and Laos. From the pass mostly, the border trade goods are traditional textile and garment mainly served locals and tourists which majority of traders is of small and medium size. In the present day the competition is fierce, the volume of trade has expanded far beyond its original intent. The major competitors in Thai-Laos border trade are China, Vietnam and also South Korea. This research measures and compares the efficiency and ability to survive the onslaught of Thai and Laos firm along Thailand (Nong Kai province) and Laos (Vientiane) border. Two attack strategies are observed, price cutting and incense such as full facilitation for big volume order. Data Envelopment Analysis (DEA) is applied to data surveyed from 90 Thai and Laos entrepreneurs. The expected results are the proportion of efficiency and inefficiency firms. Points of inefficiency and suggested improvement are also discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=border%20trade" title="border trade">border trade</a>, <a href="https://publications.waset.org/abstracts/search?q=dea" title=" dea"> dea</a>, <a href="https://publications.waset.org/abstracts/search?q=textile" title=" textile"> textile</a>, <a href="https://publications.waset.org/abstracts/search?q=garment" title=" garment"> garment</a> </p> <a href="https://publications.waset.org/abstracts/65905/efficiency-analysis-of-trader-in-thailand-and-laos-border-trade-case-study-of-textile-and-garment-products" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/65905.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">245</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">324</span> Mobile Agent Security Using Reference Monitor Based Security Framework</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sandhya%20Armoogum">Sandhya Armoogum</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=security" title="security">security</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20agents" title=" mobile agents"> mobile agents</a>, <a href="https://publications.waset.org/abstracts/search?q=reference%20monitor" title=" reference monitor"> reference monitor</a>, <a href="https://publications.waset.org/abstracts/search?q=trust" title=" trust"> trust</a> </p> <a href="https://publications.waset.org/abstracts/31788/mobile-agent-security-using-reference-monitor-based-security-framework" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31788.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">440</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">323</span> A Socio-Technical Approach to Cyber-Risk Assessment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kitty%20Kioskli">Kitty Kioskli</a>, <a href="https://publications.waset.org/abstracts/search?q=Nineta%20Polemi"> Nineta Polemi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Evaluating the levels of cyber-security risks within an enterprise is most important in protecting its information system, services and all its digital assets against security incidents (e.g. accidents, malicious acts, massive cyber-attacks). The existing risk assessment methodologies (e.g. eBIOS, OCTAVE, CRAMM, NIST-800) adopt a technical approach considering as attack factors only the capability, intention and target of the attacker, and not paying attention to the attacker’s psychological profile and personality traits. In this paper, a socio-technical approach is proposed in cyber risk assessment, in order to achieve more realistic risk estimates by considering the personality traits of the attackers. In particular, based upon principles from investigative psychology and behavioural science, a multi-dimensional, extended, quantifiable model for an attacker’s profile is developed, which becomes an additional factor in the cyber risk level calculation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attacker" title="attacker">attacker</a>, <a href="https://publications.waset.org/abstracts/search?q=behavioural%20models" title=" behavioural models"> behavioural models</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20risk%20assessment" title=" cyber risk assessment"> cyber risk assessment</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20factors" title=" human factors"> human factors</a>, <a href="https://publications.waset.org/abstracts/search?q=investigative%20psychology" title=" investigative psychology"> investigative psychology</a>, <a href="https://publications.waset.org/abstracts/search?q=ISO27001" title=" ISO27001"> ISO27001</a>, <a href="https://publications.waset.org/abstracts/search?q=ISO27005" title=" ISO27005"> ISO27005</a> </p> <a href="https://publications.waset.org/abstracts/130520/a-socio-technical-approach-to-cyber-risk-assessment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/130520.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">165</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">322</span> Comprehensive Ultrasonography During Low-flow Bypass in Patients with Symptomatic Internal Carotid Artery (ICA) Occlusion</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=G.%20K.%20Guseynova">G. K. Guseynova</a>, <a href="https://publications.waset.org/abstracts/search?q=V.%20V.%20Krylov"> V. V. Krylov</a>, <a href="https://publications.waset.org/abstracts/search?q=L.%20T.%20Khamidova"> L. T. Khamidova</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20A.%20Polunina"> N. A. Polunina</a>, <a href="https://publications.waset.org/abstracts/search?q=V.%20A.%20Lukyanchikov"> V. A. Lukyanchikov</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The report presents complex ultrasound diagnostics in patients with symptomatic steno-occlusive lesions of extra- and intracranial branches of brachiocephalic arteries (BCA). The tasks and possibilities of ultrasound diagnostics at different stages of treatment of patients with symptomatic occlusion of internal carotid artery (ICA) are covered in detail; qualitative and quantitative characteristics of blood flow; parameters of the wall and lumen of the main arteries of the head; methods of ultrasound examination of indirect assessment of the functional status are presented. Special attention is paid to the description of indicators that are predictors of the consistency of formed extra-intracranial low-flow shunts, examples of functioning and failed anastomoses are analyzed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CBF" title="CBF">CBF</a>, <a href="https://publications.waset.org/abstracts/search?q=cerebral%20blood%20flow%3B%20CTA" title=" cerebral blood flow; CTA"> cerebral blood flow; CTA</a>, <a href="https://publications.waset.org/abstracts/search?q=external%20carotid%20artery%3B%20ICA" title=" external carotid artery; ICA"> external carotid artery; ICA</a>, <a href="https://publications.waset.org/abstracts/search?q=internal%20carotid%20artery%3B%20MCA" title=" internal carotid artery; MCA"> internal carotid artery; MCA</a>, <a href="https://publications.waset.org/abstracts/search?q=middle%20cerebral%20artery%3B%20MRA" title=" middle cerebral artery; MRA"> middle cerebral artery; MRA</a>, <a href="https://publications.waset.org/abstracts/search?q=magnetic%20resonance%20angiography%3B%20OEF" title=" magnetic resonance angiography; OEF"> magnetic resonance angiography; OEF</a>, <a href="https://publications.waset.org/abstracts/search?q=oxygen%20extraction%20fraction%3B%20TIA" title=" oxygen extraction fraction; TIA"> oxygen extraction fraction; TIA</a>, <a href="https://publications.waset.org/abstracts/search?q=transient%20ischaemic%20attack" title=" transient ischaemic attack"> transient ischaemic attack</a>, <a href="https://publications.waset.org/abstracts/search?q=ultrasound" title=" ultrasound"> ultrasound</a>, <a href="https://publications.waset.org/abstracts/search?q=low-flow%20bypass" title=" low-flow bypass"> low-flow bypass</a>, <a href="https://publications.waset.org/abstracts/search?q=anastomoses" title=" anastomoses"> anastomoses</a> </p> <a href="https://publications.waset.org/abstracts/186846/comprehensive-ultrasonography-during-low-flow-bypass-in-patients-with-symptomatic-internal-carotid-artery-ica-occlusion" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/186846.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">43</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">321</span> Analysis of Sulphur-Oxidizing Bacteria Attack on Concrete Based on Waste Materials </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20E%C5%A1tokov%C3%A1">A. Eštoková</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Koval%C4%8D%C3%ADkov%C3%A1"> M. Kovalčíková</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Lupt%C3%A1kov%C3%A1"> A. Luptáková</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Si%C4%8D%C3%A1kov%C3%A1"> A. Sičáková</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Ondov%C3%A1"> M. Ondová</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Concrete durability as an important engineering property of concrete, determining the service life of concrete structures very significantly, can be threatened and even lost due to the interactions of concrete with external environment. Bio-corrosion process caused by presence and activities of microorganisms producing sulphuric acid is a special type of sulphate deterioration of concrete materials. The effects of sulphur-oxidizing bacteria Acidithiobacillus thiooxidans on various concrete samples, based on silica fume and zeolite, were investigated in laboratory during 180 days. A laboratory study was conducted to compare the performance of concrete samples in terms of the concrete deterioration influenced by the leaching of calcium and silicon compounds from the cement matrix. The changes in the elemental concentrations of calcium and silicon in both solid samples and liquid leachates were measured by using X – ray fluorescence method. Experimental studies confirmed the silica fume based concrete samples were found out to have the best performance in terms of both silicon and calcium ions leaching. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=biocorrosion" title="biocorrosion">biocorrosion</a>, <a href="https://publications.waset.org/abstracts/search?q=concrete" title=" concrete"> concrete</a>, <a href="https://publications.waset.org/abstracts/search?q=leaching" title=" leaching"> leaching</a>, <a href="https://publications.waset.org/abstracts/search?q=bacteria" title=" bacteria"> bacteria</a> </p> <a href="https://publications.waset.org/abstracts/8495/analysis-of-sulphur-oxidizing-bacteria-attack-on-concrete-based-on-waste-materials" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/8495.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">451</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">320</span> A New Family of Flying Wing Low Reynolds Number Airfoils</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ciro%20Sobrinho%20Campolina%20Martins">Ciro Sobrinho Campolina Martins</a>, <a href="https://publications.waset.org/abstracts/search?q=Halison%20da%20Silva%20Pereira"> Halison da Silva Pereira</a>, <a href="https://publications.waset.org/abstracts/search?q=Vitor%20Mainenti%20Leal%20Lopes"> Vitor Mainenti Leal Lopes</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Unmanned Aerial vehicles (UAVs) has been used in a wide range of applications, from precise agriculture monitoring for irrigation and fertilization to military attack missions. Long range performance is required for many of these applications. Tailless aircrafts are commonly used as long-range configurations and, due to its small amount of stability, the airfoil shape design of its wings plays a central role on the performance of the airplane. In this work, a new family of flying wing airfoils is designed for low Reynolds number flows, typical of small-middle UAVs. Camber, thickness and their maximum positions in the chord are variables used for the airfoil geometry optimization. Aerodynamic non-dimensional coefficients were obtained by the well-established Panel Method. High efficient airfoils with small pitch moment coefficient are obtained from the analysis described and its aerodynamic polars are plotted. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=airfoil%20design" title="airfoil design">airfoil design</a>, <a href="https://publications.waset.org/abstracts/search?q=flying%20wing" title=" flying wing"> flying wing</a>, <a href="https://publications.waset.org/abstracts/search?q=low%20Reynolds%20number" title=" low Reynolds number"> low Reynolds number</a>, <a href="https://publications.waset.org/abstracts/search?q=tailless%20aircraft" title=" tailless aircraft"> tailless aircraft</a>, <a href="https://publications.waset.org/abstracts/search?q=UAV" title=" UAV"> UAV</a> </p> <a href="https://publications.waset.org/abstracts/33946/a-new-family-of-flying-wing-low-reynolds-number-airfoils" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33946.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">629</span> </span> </div> </div> <ul class="pagination"> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=smudge%20attack&page=9" rel="prev">‹</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=smudge%20attack&page=1">1</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=smudge%20attack&page=2">2</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=smudge%20attack&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=smudge%20attack&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=smudge%20attack&page=9">9</a></li> <li class="page-item active"><span class="page-link">10</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=smudge%20attack&page=11">11</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=smudge%20attack&page=12">12</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=smudge%20attack&page=13">13</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=smudge%20attack&page=20">20</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=smudge%20attack&page=21">21</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=smudge%20attack&page=11" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>