scholarly journals A Review on Research on Critical Analysis on Performance of RCC Structure under various Blast Condition

Author(s):  
Parth Samarth

The main aim of this paper is design and implement Critical Analysis on Performance of RCC Structure Under Various Blast Condition. Advance in technology over the past few decades have necessitated the dynamic effect of loading blast such as wind and earthquake loads. The main purpose of this study is to gain access to materials on blast loads that can be designed, to assess vulnerabilities and to provides guidance to designed to economically reduce the impact of explosion on building and provide protection to human and infrastructure. A case study is performed on an RC column subject to blast loading; the effect of force on the deflection over time, the stress rate on the tensile is studies. The compression mechanism is studies by following the alternative path method for minimum design load for building and other structures. The 2-storey building is analyzed and the displacement and blast loading and standoff distance on the floor vehicles are studied by adding X-type brackets and shear wall to make them explosion resistant. Structural, architectural and managerial aspects of the design are also included in the report so that the structures become blast resistant.

Author(s):  
Chad Calvert ◽  
Taghi M. Khoshgoftaar ◽  
Maryam M. Najafabadi ◽  
Clifford Kemp

In this work, we outline a procedure for collecting and labeling Man-in-the-Middle (MITM) attack traffic. Our capture procedure allows for the collection of real-world representative data using a full-scale network environment. MITM attacks are typically performed with the purpose of intercepting information amongst two networked machines. This enables the attacker to gain access to otherwise confidential communications and potentially alter said communications maliciously. MITM attacks are still a very common attack that can be implemented with relative ease across a variety of network environments. Our work establishes experimental procedures for enacting three prevalent MITM attack variants through penetration testing. The process for data collection is defined, along with our approach on gathering real-world, representative data. We also present a novel labeling procedure based on the inherent behaviors of each MITM attack variant. Our work aims to address the challenges associated with collecting such data within a live production environment, as well as identify the impact MITM attacks have on traffic behavior. We also present a case study to provide some quantitative analysis regarding the data collected.


2001 ◽  
Vol 26 (2) ◽  
pp. 26-30 ◽  
Author(s):  
Chris Goddard ◽  
Bernadette Saunders

In recent years there has been considerable analysis of how the media create images of crime. The relationship between child abuse and the media has also been subject to greater scrutiny. This article examines the role of one newspaper in a child protection case. The part played by the newspaper in the court case led to an examination of the language used by the media in their representations of children. The researchers found that a child may be objectified in language even when the child’s gender is previously identified. The ‘gender slippage’ may in extreme cases lead to the ‘textual abuse’ of children, where child abuse is rewritten to lessen the impact on the reader. The authors conclude that the actions of journalists and the language they use require more critical analysis.


2016 ◽  
Vol 10 (1) ◽  
pp. 43-64
Author(s):  
Imran Awan ◽  
Sara Correia

Since the 9/11 attacks in 2001, there have been a number of terrorist suspects arrested in the UK, but ¾ of those people are released without charge (Choudhury & Fenwick 2011). This has led to claims from within these communities that counter-terrorism legislation is both heavy handed and counter-productive. This article presents findings from a pilot research project that examined how best to engage with Muslim communities and to examine perceptions from these communities with regards to counter-terrorism legislation. There were two aims for the pilot study. The first was to provide members of the Muslim community in Cardiff with information about the nature of the study, its objectives and the individuals who would be undertaking the research. The second, following from the first, was to assess the feasibility of different methods of undertaking the research with representatives of Cardiff’s Muslim communities. This in turn would help address issues such as how to gain access to participants; how to obtain informed consent for participation in the research; identifying appropriate methods of data collection; appropriate venues for the fieldwork; identifying ethical concerns arising from the research; and identifying any risks to participants and researchers arising from the research, as well as the strategies needed to overcome these risks. This was a qualitative case study which utilized grounded theory principles to generate a theoretical model and involved interviews with 6 people and a focus group consisting of 3 people. In short, this study offers a blue print for further research into the impact of counter terrorism legislation on Muslim communities in Cardiff and makes a unique contribution to the literature on Muslims in Britain as well as counter terrorism studies as Cardiff’s Muslim communities remain under-researched.


2017 ◽  
pp. 111-140 ◽  
Author(s):  
R. Kapeliushnikov

The paper provides a critical analysis of the idea of technological unemployment. The overview of the existing literature on the employment effects of technological change shows that on the micro-level there exists strong and positive relationship between innovations and employment growth in firms; on the sectoral level this correlation becomes ambiguous; on the macro-level the impact of new technologies seems to be positive or neutral. This implies that fears of explosive growth of technological unemployment in the foreseeable future are exaggerated. Our analysis further suggests that new technologies affect mostly the structure of employment rather than its level. Additionally we argue that automation and digitalisation would change mostly task sets within particular occupations rather than distribution of workers by occupations.


2018 ◽  
Author(s):  
Ylber Limani ◽  
Edmond Hajrizi ◽  
Rina Sadriu

Sign in / Sign up

Export Citation Format

Share Document