2021 ◽  
pp. 096834452110214
Author(s):  
Gün Kut

Cevat Paşa (General Cevat Çobanlı: 1870-1938) was an Ottoman Army officer who played a decisive role in the defence of the Dardanelles Strait against the Allied offensive during the First World War. He had been primarily responsible for the preparation and improvement of defensive plans as the commander of the Çanakkale Fortified Zone, as well as the implementation of these plans during the Allied naval assault of 19 February-18 March 1915. The ultimate failure of the offensive was mainly due to the careful planning and successful execution of defensive measures under the command of Cevat Paşa.


2021 ◽  
Vol 5 (4) ◽  
pp. 438
Author(s):  
Siti Salwani Binti Yaacob ◽  
Hairulnizam Bin Mahdin ◽  
Mohammed Saeed Jawad ◽  
Nayef Abdulwahab Mohammed Alduais ◽  
Akhilesh Kumar Sharma ◽  
...  

The globalization of manufacturing has increased the risk of counterfeiting as the demand grows, the production flow increases, and the availability expands. The intensifying counterfeit issues causing a worriment to companies and putting lives at risk. Companies have ploughed a large amount of money into defensive measures, but their efforts have not slowed counterfeiters. In such complex manufacturing processes, decision-making and real-time reactions to uncertain situations throughout the production process are one way to exploit the challenges. Detecting uncertain conditions such as counterfeit and missing items in the manufacturing environment requires a specialized set of technologies to deal with a flow of continuously created data. In this paper, we propose an uncertain detection algorithm (UDA), an approach to detect uncertain events such as counterfeit and missing items in the RFID distributed system for a manufacturing environment. The proposed method is based on the hashing and thread pool technique to solve high memory consumption, long processing time and low event throughput in the current detection approaches. The experimental results show that the execution time of the proposed method is averagely reduced 22% in different tests, and our proposed method has better performance in processing time based on RFID event streams.


Author(s):  
Bruce Geddes ◽  
Ray Torok

The Electric Power Research Institute (EPRI) is conducting research in cooperation with the Nuclear Energy Institute (NEI) regarding Operating Experience of digital Instrumentation and Control (I&C) systems in US nuclear power plants. The primary objective of this work is to extract insights from US nuclear power plant Operating Experience (OE) reports that can be applied to improve Diversity and Defense in Depth (D3) evaluations and methods for protecting nuclear plants against I&C related Common Cause Failures (CCF) that could disable safety functions and thereby degrade plant safety. Between 1987 and 2007, over 500 OE events involving digital equipment in US nuclear power plants were reported through various channels. OE reports for 324 of these events were found in databases maintained by the Nuclear Regulatory Commission (NRC) and the Institute of Nuclear Power Operations (INPO). A database was prepared for capturing the characteristics of each of the 324 events in terms of when, where, how, and why the event occurred, what steps were taken to correct the deficiency that caused the event, and what defensive measures could have been employed to prevent recurrence of these events. The database also captures the plant system type, its safety classification, and whether or not the event involved a common cause failure. This work has revealed the following results and insights: - 82 of the 324 “digital” events did not actually involve a digital failure. Of these 82 non-digital events, 34 might have been prevented by making full use of digital system fault tolerance features. - 242 of the 324 events did involve failures in digital systems. The leading contributors to the 242 digital failures were hardware failure modes. Software change appears as a corrective action twice as often as it appears as an event root cause. This suggests that software features are being added to avoid recurrence of hardware failures, and that adequately designed software is a strong defensive measure against hardware failure modes, preventing them from propagating into system failures and ultimately plant events. 54 of the 242 digital failures involved a Common Cause Failure (CCF). - 13 of the 54 CCF events affected safety (1E) systems, and only 2 of those were due to Inadequate Software Design. This finding suggests that software related CCFs on 1E systems are no more prevalent than other CCF mechanisms for which adherence to various regulations and standards is considered to provide adequate protection against CCF. This research provides an extensive data set that is being used to investigate many different questions related to failure modes, causes, corrective actions, and other event attributes that can be compared and contrasted to reveal useful insights. Specific considerations in this study included comparison of 1E vs. non-1E systems, active vs. potential CCFs, and possible defensive measures to prevent these events. This paper documents the dominant attributes of the evaluated events and the associated insights that can be used to improve methods for protecting against digital I&C related CCFs, applying a test of reasonable assurance.


2007 ◽  
Vol 66 (2) ◽  
pp. 422-460 ◽  
Author(s):  
Andrew Johnston

The City Code on Takeovers and Mergers has generally been lauded as a system of self-regulation that offers the advantages of speed, flexibility and low cost administration by experts. Many of its provisions are uncontroversial and do indeed reflect a consensus view about the way in which takeovers should be carried out. However, the Code's prohibition on defensive measures by management in the event of a takeover is far more controversial. This article argues that the City Code – and the prohibition on defensive measures in particular - was introduced because the common law had demonstrated itself incapable of putting in place a system of takeover regulation that ensured the takeover remained a viable means of ensuring managerial accountability to shareholders. Its introduction in 1968 fundamentally transformed the UK's system of corporate governance. Through its prohibition on defensive measures once a takeover becomes imminent, the Code truncates the general management discretion that lies at the heart of company law and forces management to focus on the generation of short-term shareholder value. What is striking is that this fundamental reorientation of the way in which companies are controlled was brought about not by an Act of Parliament but by a self-regulatory measure put in place by financial institutions. Following the implementation of the Takeover Directive, which itself was heavily influenced by the City Code, the Companies Act 2006 now requires the Takeover Panel to maintain that prohibition.


2020 ◽  
Vol 12 (10) ◽  
pp. 166
Author(s):  
Louis Edward Papa ◽  
Thaier Hayajneh

This paper examines the phenomenon of digital persecution in the Global South and evaluates tools that defend against it. First, the paper explains the nature of persecution and its digital incarnation. It then provides a contextual overview of real-world instances of digital persecution in seven Global South countries. The possible defensive technologies against censorship and surveillance are discussed. The article goes on to discuss barriers to technology adoption in the Global South, explains the security implication of these difficulties, and examines the role that human computer interaction (HCI) metrics could play in overcoming these challenges. Finally, the paper surveys the viability of sixteen security tools in a Global South context. The survey results were mixed, with 37.5% of the reviewed tools being deemed to be inviable for use in the Global South to defend against persecution. Prescriptive recommendations are provided for creating security tools that are universal, simple, and effective.


Sign in / Sign up

Export Citation Format

Share Document