Abstract: Although gun barrel steels are an important variety from defense view point, available literatures are very limited. In the present work, an IF grade Ni-Cr-Mo-V high strength low alloy steel is produced in Electric Earth Furnace-ESR Route. Ingot was hot forged to desired dimension with a reduction ratio of 70-75% followed by homogenization, hardening and tempering treatment. Sample chemistry, NMIR, macro and micro structural analyses were done. Mechanical properties which include tensile, impact, and fracture toughness were studied. Ultrasonic testing was done to identify internal flaws. The existing high strength low alloy Ni-Cr-Mo-V steel shows improved properties in modified processing route and heat treatment schedule in comparison to properties noted earlier for manufacturing of gun barrels. The improvement in properties seems to withstand higher explosive loads with the same amount of steel in gun barrel application.
Abstract: As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.
Abstract: This study presents the seismic safety evaluation of weir structure subjected to strong earthquake ground motions, as a flood defense structure in civil engineering structures. The seismic safety analysis procedure was illustrated through development of Finite Element (FE) and InFinite Element (IFE) method in ABAQUS platform. The IFE model was generated by CINPS4, 4-node linear one-way infinite model as a sold continuum infinite element in foundation areas of the weir structure and then nonlinear FE model using friction model for soil-structure interactions was applied in this study. In order to understand the complex behavior of weir structures, nonlinear time history analysis was carried out. Consequently, it was interesting to note that the compressive stress gave more vulnerability to the weir structure, in comparison to the tensile stress, during an earthquake. The stress concentration of the weir structure was shown at the connection area between the weir body and stilling basin area. The stress both tension and compression was reduced in IFE model rather than FE model of weir structures.
Abstract: We investigate the large scale of networks in the
context of network survivability under attack. We use appropriate
techniques to evaluate and the attacker-based- and the defenderbased-
network survivability. The attacker is unaware of the operated
links by the defender. Each attacked link has some pre-specified
probability to be disconnected. The defender choice is so that to
maximize the chance of successfully sending the flow to the
destination node. The attacker however will select the cut-set with
the highest chance to be disabled in order to partition the network.
Moreover, we extend the problem to the case of selecting the best p
paths to operate by the defender and the best k cut-sets to target by
the attacker, for arbitrary integers p,k>1. We investigate some
variations of the problem and suggest polynomial-time solutions.
Abstract: The purpose of this study is analyzing the relationship
between trust and social capital of people with using Social Network
Analysis. In this study, two aspects of social capital will be focused:
Bonding, homophilous social capital (BoSC), and Bridging,
heterophilous social capital (BrSC). These two aspects diverge each
other regarding to the social theories. The other concept of the study
is Trust (Tr), namely interpersonal trust, willing to ascribe good
intentions to and have confidence in the words and actions of other
people. In this study, the sample group, 61 people, was selected from
a private firm from the defense industry. The relation between
BoSC/BrSC and Tr is shown by using Social Network Analysis
(SNA) and statistical analysis with Likert type-questionnaire. The
results of the analysis show the Cronbach’s alpha value is 0.756 and
social capital values (BoSC/BrSC) is not correlated with Tr values of
the people.
Abstract: Password authentication is one of the widely used
methods to achieve authentication for legal users of computers and
defense against attackers. There are many different ways to
authenticate users of a system and there are many password cracking
methods also developed. This paper proposes how best password
cracking can be performed on a CPU-GPGPU based system. The
main objective of this work is to project how quickly a password can
be cracked with some knowledge about the computer security and
password cracking if sufficient security is not incorporated to the
system.
Abstract: To maintain a healthy balanced loyalty, whether to art
or society, posits a debatable issue. The artist is always on the look
out for the potential tension between those two realms. Therefore,
one of the most painful dilemmas the artist finds is how to function in
a society without sacrificing the aesthetic values of his/her work. In
other words, the life-long awareness of failure which derives from the
concept of the artist as caught between unflattering social realities
and the need to invent genuine art forms becomes a fertilizing soil for
the artists to be tackled. Thus, within the framework of this dilemma,
the question of the responsibility of the artist and the relationship of
the art to politics will be illuminating. To a larger extent, however, in
drama, this dilemma is represented by the fictional characters of the
play. The present paper tackles the idea of the amorality of the artist in
selected plays by Tom Stoppard. However, Stoppard’s awareness of
his situation as a refugee has led him to keep at a distance from
politics. He tried hard to avoid any intervention into the realms of
political debate, especially in his earliest work. On the one hand, it is
not meant that he did not interest in politics as such, but rather he
preferred to question it than to create a fixed ideological position. On
the other hand, Stoppard’s refusal to intervene in politics is ascribed
to his feeling of gratitude to Britain where he settled. As a result,
Stoppard has frequently been criticized for a lack of political
engagement and also for not leaning too much for the left when he
does engage. His reaction to these public criticisms finds expression
in his self-conscious statements which defensively stressed the
artifice of his work. He, like Oscar Wilde thinks that the
responsibility of the artist is devoted to the realm of his/her art.
Consequently, his consciousness for the role of the artist is truly
reflected in his two plays, Artist Descending a Staircase (1972) and
Travesties (1974).
Abstract: The first layer of defense against data loss is the backup
data. This paper implements an agent-based network backup system
used the backup, server-storage and server-backup agent these
tripartite construction, and the snapshot and hierarchical index are
used in the NSBS. It realizes the control command and data flow
separation, balances the system load, thereby improving efficiency of
the system backup and recovery. The test results show the agent-based
network backup system can effectively improve the task-based
concurrency, reasonably allocate network bandwidth, the system
backup performance loss costs smaller and improves data recovery
efficiency by 20%.
Abstract: Second generation military Filipino Amerasians
comprise a formidable contemporary segment of the estimated
250,000-plus biracial Amerasians in the Philippines today. Overall,
they are a stigmatized and socioeconomically marginalized diaspora;
historically, they were abandoned or estranged by U.S. military
personnel fathers assigned during the century-long Colonial, Post-
World War II and Cold War Era of permanent military basing (1898-
1992). Indeed, U.S. military personnel are assigned in smaller
numbers in the Philippines today. This inquiry is an outgrowth of two
recent small sample studies. The first surfaced the impact of the U.S.
military prostitution system on formation of the ‘Derivative
Amerasian Family Construct’ on first generation Amerasians; a
second, qualitative case study suggested the continued effect of the
prostitution systems' destructive impetuous on second generation
Amerasians. The intent of this current qualitative, multiple-case study
was to actively seek out second generation sex industry toilers. The
purpose was to focus further on this human phenomenon in the postbasing
and post-military prostitution system eras. As background, the
former military prostitution apparatus has transformed into a modern
dynamic of rampant sex tourism and prostitution nationwide. This is
characterized by hotel and resorts offering unrestricted carnal access,
urban and provincial brothels (casas), discos, bars and pickup clubs,
massage parlors, local barrio karaoke bars and street prostitution. A
small case study sample (N = 4) of female and male second
generation Amerasians were selected. Sample formation employed a
non-probability ‘snowball’ technique drawing respondents from the
notorious Angeles, Metro Manila, Olongapo City ‘AMO Amerasian
Triangle’ where most former U.S. military installations were sited
and modern sex tourism thrives. A six-month study and analysis of
in-depth interviews of female and male sex laborers, their families
and peers revealed a litany of disturbing, and troublesome
experiences. Results showed profiles of debilitating human poverty,
history of family disorganization, stigmatization, social
marginalization and the ghost of the military prostitution system and
its harmful legacy on Amerasian family units. Emerging were testimonials of wayward young people ensnared in a maelstrom of
deep economic deprivation, familial dysfunction, psychological
desperation and societal indifference. The paper recommends that
more study is needed and implications of unstudied psychosocial and
socioeconomic experiences of distressed younger generations of
military Amerasians require specific research. Heretofore apathetic or
disengaged U.S. institutions need to confront the issue and formulate
activist and solution-oriented social welfare, human services and
immigration easement policies and alternatives. These institutions
specifically include academic and social science research agencies,
corporate foundations, the U.S. Congress, and Departments of State,
Defense and Health and Human Services, and Homeland Security
(i.e. Citizen and Immigration Services) It is them who continue to
endorse a laissez-faire policy of non-involvement over the entire
Filipino Amerasian question. Such apathy, the paper concludes,
relegates this consequential but neglected blood progeny to the status
of humiliating destitution and exploitation. Amerasians; thus, remain
entrapped in their former colonial, and neo-colonial habitat.
Ironically, they are unwitting victims of a U.S. American homeland
that fancies itself geo-politically as a strong and strategic military
treaty ally of the Philippines in the Western Pacific.
Abstract: The security of cloud services is the concern of cloud
service providers. In this paper, we will mention different
classifications of cloud attacks referred by specialized organizations.
Each agency has its classification of well-defined properties. The
purpose is to present a high-level classification of current research in
cloud computing security. This classification is organized around
attack strategies and corresponding defenses.
Abstract: Aluminium matrix composites with alumina
reinforcements give superior mechanical & physical properties. Their
applications in several fields like automobile, aerospace, defense,
sports, electronics, bio-medical and other industrial purposes are
becoming essential for the last several decades. In the present work,
fabrication of hybrid composite was done by Stir casting technique
using Al 6061 as a matrix with alumina and silicon carbide (SiC) as
reinforcement materials. The weight percentage of alumina is varied
from 2 to 4% and the silicon carbide weight percentage is maintained
constant at 2%. Hardness and wear tests are performed in the as cast
and heat treated conditions. Age hardening treatment was performed
on the specimen with solutionizing at 550°C, aging at two
temperatures (150 and 200°C) for different time durations. Hardness
distribution curves are drawn and peak hardness values are recorded.
Hardness increase was very sensitive with respect to the decrease in
aging temperature. There was an improvement in wear resistance of
the peak aged material when aged at lower temperature. Also
increase in weight percent of alumina, increases wear resistance at
lower temperature but opposite behavior was seen when aged at
higher temperature.
Abstract: Paranoid ideation is a common thought process that
constitutes a defense against perceived social threats. The current
study aimed at the characterization of paranoid ideation in youths and
to explore the possible predictors involved in the development of
paranoid ideations. Paranoid ideation, shame, submission, early
childhood memories and current depressive, anxious and stress
symptomatology were assessed in a sample of 1516 Portuguese
youths. Higher frequencies of paranoid ideation were observed,
particularly in females and youths from lower socioeconomic status.
The main predictors identified relates to submissive behaviors and
adverse childhood experiences, and especially to shame feelings. The
current study emphasizes that the these predictors are similar to
findings in adults and clinical populations, and future implications to
research and clinical practice aiming at paranoid ideations are
discussed, as well as the pertinence of the study of mediating factors
that allow a wider understanding of this thought process in younger
populations and the prevention of psychopathology in adulthood.
Abstract: By textile science incorporating with electronic
industry, developed textile products start to take part in different
areas such as industry, military, space, medical etc. for health,
protection, defense, communication and automation. Electronic
textiles (e-textiles) are fabrics that contain electronics and
interconnections with them. In this study, two types of base yarns
(cotton and acrylic) and three types of conductive steel yarns with
different linear resistance values (14Ω/m, 30Ω/m, 70Ω/m) were used
to investigate the effect of base yarn type and linear resistance of
conductive yarns on thermal behavior of e-textile structures. Thermal
behavior of samples was examined by thermal camera.
Abstract: An artificial neural network is a mathematical model
inspired by biological neural networks. There are several kinds of
neural networks and they are widely used in many areas, such as:
prediction, detection, and classification. Meanwhile, in day to day life,
people always have to make many difficult decisions. For example,
the coach of a soccer club has to decide which offensive player
to be selected to play in a certain game. This work describes a
novel Neural Network using a combination of the General Regression
Neural Network and the Probabilistic Neural Networks to help a
soccer coach make an informed decision.
Abstract: Diminished antioxidant defense or increased
production of reactive oxygen species in the biological system can
result in oxidative stress which may lead to various
neurodegenerative diseases including Alzheimer’s disease (AD).
Microglial activation also contributes to the progression of AD by
producing several proinflammatory cytokines, nitric oxide (NO) and
prostaglandin E2 (PGE2). Oxidative stress and inflammation have
been reported to be possible pathophysiological mechanisms
underlying AD. In addition, the cholinergic hypothesis postulates that
memory impairment in patient with AD is also associated with the
deficit of cholinergic function in the brain. Although a number of
drugs have been approved for the treatment of AD, most of these
synthetic drugs have diverse side effects and yield relatively modest
benefits. Marine algae have great potential in pharmaceutical and
biomedical applications as they are valuable sources of bioactive
properties such as anticoagulation, antimicrobial, antioxidative,
anticancer and anti-inflammatory. Hence, this study aimed to provide
an overview of the properties of Malaysian seaweeds (Padina
australis, Sargassum polycystum and Caulerpa racemosa) in
inhibiting oxidative stress, neuroinflammation and cholinesterase
enzymes. These seaweeds significantly exhibited potent DPPH and
moderate superoxide anion radical scavenging ability (P
Abstract: Unmanned aircraft systems (UAS) are playing
increasingly prominent roles in defense programs and defense
strategies around the world. Technology advancements have
enabled the development of it to do many excellent jobs as
reconnaissance, surveillance, battle fighters, and communications
relays. Simulating a small unmanned aerial vehicle (SUAV)
dynamics and analyzing its behavior at the preflight stage is too
important and more efficient. The first step in the UAV design is
the mathematical modeling of the nonlinear equations of motion. .
In this paper, a survey with a standard method to obtain the full
non-linear equations of motion is utilized, and then the
linearization of the equations according to a steady state flight
condition (trimming) is derived. This modeling technique is
applied to an Ultrastick-25e fixed wing UAV to obtain the valued
linear longitudinal and lateral models. At the end the model is
checked by matching between the behavior of the states of the nonlinear
UAV and the resulted linear model with doublet at the
control surfaces.
Abstract: The practice of freeing monuments from subsequent
additions crosses the entire history of conservation and it is
traditionally connected to the aim of valorisation, both for cultural
and educational purpose and recently even for touristic exploitation.
Defence heritage has been widely interested by these cultural and
technical moods from philological restoration to critic innovations. A
renovated critical analysis of Italian episodes and in particular the
Sardinian case of the area of San Pancrazio in Cagliari, constitute an
important lesson about the limits of this practice and the uncertainty
in terms of results, towards the definition of a sustainable good
practice in the restoration of military architectures.
Abstract: Composite materials, due to their unique properties
such as high strength to weight ratio, corrosion resistance, and impact
resistance have huge potential as structural materials in automotive,
construction and transportation applications. However, these
properties often come at higher cost owing to complex design
methods, difficult manufacturing processes and raw material cost.
Traditionally, tapered laminated composite structures are
manufactured using autoclave manufacturing process by ply drop off
technique. Autoclave manufacturing though very powerful suffers
from high capital investment and higher energy consumption. As per
the current trends in composite manufacturing, Out of Autoclave
(OoA) processes are looked as emerging technologies for
manufacturing the structural composite components for aerospace
and defense applications. However, there is a need for improvement
among these processes to make them reliable and consistent. In this
paper, feasibility of using out of autoclave process to manufacture the
variable thickness cantilever beam is discussed. The minimum weight
design for the composite beam is obtained using constant stress beam
concept by tailoring the thickness of the beam. Ply drop off
techniques was used to fabricate the variable thickness beam from
glass/epoxy prepregs. Experiments were conducted to measure
bending stresses along the span of the cantilever beam at different
intervals by applying the concentrated load at the free end.
Experimental results showed that the stresses in the bean at different
intervals were constant. This proves the ability of OoA process to
manufacture the constant stress beam. Finite element model for the
constant stress beam was developed using commercial finite element
simulation software. It was observed that the simulation results
agreed very well with the experimental results and thus validated
design and manufacturing approach used.
Abstract: Heavy metals are one of the major groups of
contaminants in the environment and many of them are toxic even at
very low concentration in plants and animals. However, some metals
play important roles in the biological function of many enzymes in
living organisms. Metals such as zinc, iron, and cooper are important
for survival and activity of enzymes in plants, however heavy metals
can inhibit enzyme which is responsible for defense system of plants.
Polyphenol oxidase (PPO) is a copper-containing metalloenzyme
which is responsible for enzymatic browning reaction of plants.
Enzymatic browning is a major problem for the handling of
vegetables and fruits in food industry. It can be increased and
effected with many different futures such as metals in the nature and
ground. In the present work, PPO was isolated and characterized
from green leaves of red poppy plant (Papaverr hoeas). Then, the
effect of some known antibrowning agents which can form
complexes with metals and metals were investigated on the red poppy
PPO activity. The results showed that glutathione was the most
potent inhibitory effect on PPO activity. Cu(II) and Fe(II) metals
increased the enzyme activities however, Sn(II) had the maximum
inhibitory effect and Zn(II) and Pb(II) had no significant effect on the
enzyme activity. In order to reduce the effect of heavy metals, the
effects of metal-antibrowning agent complexes on the PPO activity
were determined. EDTA and metal complexes had no significant
effect on the enzyme. L-ascorbic acid and metal complexes decreased
but L-ascorbic acid-Cu(II)-complex had no effect. Glutathione–metal
complexes had the best inhibitory effect on Red poppy leaf PPO
activity.
Abstract: Economic development and globalization of international markets have created a favourable atmosphere for the emergence of new forms of crime such as money laundering or financing of terrorism, which may contribute to destabilized and damage economic systems. In particular, money laundering have acquired great importance since the 11S attacks, what has caused on the one hand, the establishment and development of preventive measures and, on the other hand, a progressive hardening of penal measures. Since then, the regulations imposed to fight against money laundering have been viewed as key components also in the fight against terrorist financing. Terrorism, at the beginning, was a “national” crime connected with internal problems of the State (for instance the RAF in Germany or ETA in Spain) but in the last 20 years has started to be an international problem that is connected with the defence and security of the States. Therefore, the new strategic concept for the defense and security of NATO has a comprehensive list of security threats to the Alliance, such as terrorism, international instability, money laundering or attacks on cyberspace, among others. With this new concept, money laundering and terrorism has become a priority in the national defense.
In this work we will analyze the methods to combat these new threats to the national security. We will study the preventive legislations to combat money laundering and financing of terrorism, the UIF that exchange information between States, and the hawala-Banking.