487 research outputs found

    THE EFFECT OF EXECUTIVE ORDER 13269 ON NONCITIZEN ENLISTED ACCESSIONS IN THE U.S. MILITARY

    Get PDF
    In this thesis, we analyze the effect of Executive Order 13269 on noncitizen enlisted accessions to the U.S. military as a whole and to each of the Services individually. The Defense Manpower Data Center data used in the study covers 1,983,707 enlisted prior and non-prior service accessions from fiscal year (FY) 2000 to FY2010. In order to analyze the policy effect, we aggregate the data to reflect monthly citizen and noncitizen enlisted accessions. An Ordinary Least Squares Regression using difference-in-difference estimation is adapted to reveal the effect of the policy. The results of the regression analysis show that the decrease in noncitizen accessions is greater than the decrease in citizen accessions after the executive order was implemented. The results of the analyses conducted by using data on the services support these results, except for the Coast Guard. We conclude that the executive order either had no effect or a negative effect on noncitizen enlisted accessions to the military, and we propose several policy recommendations to improve the effectiveness of the executive order. The first recommendation is to establish an effective way of recruiting noncitizens by briefing the recruiters in the Services about the executive order and its current benefits to the United States and to noncitizens. After looking at news articles to see how Executive Order 13269 was perceived and debated within society, we recommend expanding the efforts to advertise the executive order since most discussion of the order is negative. The benefits provided by the executive order should be broadened to include family members, while some requirements might be loosened to attract more noncitizens.http://archive.org/details/theeffectofexecu1094532921Captain, Turkish Army;Captain, Turkish ArmyApproved for public release; distribution is unlimited

    Distributed Atomic Swap on Cryptocurrencies

    Get PDF
    Anyone who wants to trade something in his possession with something else desires three things: To trade at the most appropriate rate, to trade at the least cost, not to be exposed to theft and fraud during the clearing. The cryptocurrency swap is also no different from swapping of any two entities. Crypto-currencies are getting more and more attractive day by day because their stock exchanges are open 24/7. Although all crypto-money markets in the world have similar expectations, existing market models have difficulties and risks while operating on them. The problem of this research is centralized exchange markets and risks while operating on them. The study aims to develop a distributed exchange model on blockchain using smart contracts for atomic swap method, and payment channels technology for liquidity. With this model, users will pay less without taking risks of centralized exchange markets, like hacking, theft and fraud.  In central exchanges, users first send their cryptocurrencies to the stock exchange's account to trade. This results in collection of all cryptocurrencies of users in a single pool. With this model, users will be allowed to wait in their wallets until the cryptocurrency is exchanged, and the risk of central hacking will be eliminated. Original contribution of this study to the literature is to combine Atomic Swap and Payment Channels technologies to create a liquid decentralized stock market model as much as central exchanges.Keywords: Atomic Swap Between Cryptocurrencies, Block-Chain; Cryptocurrency; Distributed Cryptocurrency Market; Cryptocurrency Payment GatewayDOI: 10.7176/CEIS/11-4-05Publication date:August 31st 202

    Effect of weathering on wood treated with tall oil combined with some additives

    Get PDF
    Growing interest on bio-based material has led to focus on environmentally benign wood treatment systems because of the environmental concerns. Tall oil is a by-product from pulp and paper industry, contains resin and fatty acids, and is biodegradable. Tall oil treated wood can provide some reduction in water uptake and increase in decay resistance. In this research crude tall oil was dissolved in ethanol at 5, 10 and 15 % concentrations in the treatment of Scots pine according to full cell process. Dyestuff, iron oxide and sodium ascorbate were used an additive as 0,5 %. Weathering performance of tall oil and tall oil combined with additives were investigated in accelerated weathering chamber by application of ultraviolet irradiation and water spray. It is taken for granted that increasing concentration results in higher weight percent gain in treated samples. The best results were obtained with 10 % tall oil and iron oxide which indicated minimum total color changes. Colour measurements and visual examination revealed that iron oxide was the most effective additive in reducing weathering effect and lowering the total colour change

    Efficacy of the endovascular ovarian vein embolization technique in pelvic venous congestion syndrome

    Get PDF
    Purpose: Pelvic pain, either related or unrelated to menstruation, is especially common in women of reproductive age. Thirty-nine per cent of all women suffer from chronic pelvic pain at some point in their lives, and pelvic venous congestion syndrome (PVCS) is the cause of this pain in 30% of cases. The aim of this study was to determine factors affecting the success of endovascular venous embolization used in the treatment of PVCS, and to present the longterm treatment results. Material and methods: The data of 144 female patients who underwent endovascular ovarian vein embolization for PVCS between January 2012 and July 2020 were retrospectively analysed. Results: Pain management was determined to be very successful in 37 (25.6%) patients, successful in 55 (38.1%), and unsuccessful in 52 (35.3%). Treatments using a coil alone were significantly more successful in pain management than those involving the use of different materials in addition to the coil (p = 0.036). In addition, patients with unilateral insufficiency before the procedure were found to have more successful pain management than those with bilateral insufficiency (p = 0.041). Reproductive/postmenopausal state and parity did not have a statistically significant effect on treatment efficacy (p = 0.250 and p = 0.573, respectively). Conclusions: Endovascular pelvic venous embolization is an important option in the treatment of PVCS due its less invasive and reproducible nature

    Sürücülü Kendi Kendini Dengeleyen Bir Robotun Bulanık Mantıklı PID Kontrolü

    Get PDF
    Endüstri ve tıp alanında, kendi kendini dengeleyen robotlar hakkında tüm dünyada yapılan çalışmalar son yıllarda hız kazanmıştır. Bu tip robotların kullanım alanının genişlemesiyle birlikte karşılaşılan en büyük sorunun, robotların kontrol mekanizmaları olduğu anlaşılmaktadır. Yapıları gereği kontrol edilmesi zor olan bu robotlar için literatürde çok sayıda çalışma bulunmaktadır. Bu çalışmalar incelendiğinde klasik kontrol metotlarının, bu tip robotları kontrol etmekte yetersiz kaldığı görülmektedir. Fakat klasik kontrolcüler kullanılarak geliştirilen yeni nesil karma kontrol metotlarının robotlara uygulanmasıyla birlikte robotların istenilen hareketleri daha hızlı ve kararlı bir şekilde gerçekleştirdiği gözlemlenmektedir. Bu nedenle, klasik kontrol metotlarından PID kontrolcü parametrelerinin, bulanık mantıklı kontrol metodu ile belirlenerek oluşturulan karma bir kontrol metodu bu çalışmada önerilmekte ve kendi kendini dengeleyen robota uygulanmaktadır. Ayrıca yapılan çalışmalar incelendiğinde, sadece kendi kendini dengeleyen robotların analizinin gerçekleştirildiği görülmektedir. Yapılan bu çalışmada sürücü de sisteme dahil edilerek analiz edilmiştir. İlk olarak iki tekerlekli kendi kendini dengeleyen robot modellenmiş ve bu sistem için sadece PID (oransal, integral ve türevsel) kontrolcü ve Bulanık Mantık-PID (Fuzzy Logic-PID) kontrolcü tasarlanmıştır. Bulanık Mantık-PID kontrolcünün değişken kazanım katsayılarına sahip olması klasik kontrolcülerden daha hızlı tepki vermesini sağlamaktadır. PID ve Bulanık Mantık-PID kontrolcüler ile elde edilen benzetim sonuçları karşılaştırılmıştır. Çalışmanın sonunda Bulanık Mantık-PID kontrolcünün, kontrolcü kazanımlarını kendi kendine ayarlayabildiği ve istenilen hız ve pozisyona ulaşmakta başarılı bir performansa sahip olduğu anlaşılmıştır

    Attention: there is an inconsistency between android permissions and application metadata!

    Get PDF
    This is an accepted manuscript of an article published by Springer in International Journal of Information Security on 07/01/2021, available online: https://doi.org/10.1007/s10207-020-00536-1 The accepted version of the publication may differ from the final published version.Since mobile applications make our lives easier, there is a large number of mobile applications customized for our needs in the application markets. While the application markets provide us a platform for downloading applications, it is also used by malware developers in order to distribute their malicious applications. In Android, permissions are used to prevent users from installing applications that might violate the users’ privacy by raising their awareness. From the privacy and security point of view, if the functionality of applications is given in sufficient detail in their descriptions, then the requirement of requested permissions could be well-understood. This is defined as description-to-permission fidelity in the literature. In this study, we propose two novel models that address the inconsistencies between the application descriptions and the requested permissions. The proposed models are based on the current state-of-art neural architectures called attention mechanisms. Here, we aim to find the permission statement words or sentences in app descriptions by using the attention mechanism along with recurrent neural networks. The lack of such permission statements in application descriptions creates a suspicion. Hence, the proposed approach could assist in static analysis techniques in order to find suspicious apps and to prioritize apps for more resource intensive analysis techniques. The experimental results show that the proposed approach achieves high accuracy.Published onlin

    Discovering inconsistencies between requested permissions and application metadata by using deep learning

    Full text link
    This is an accepted manuscript of an article published by IEEE in 2020 International Conference on Information Security and Cryptology (ISCTURKEY), available online at https://ieeexplore.ieee.org/document/9308004 The accepted version of the publication may differ from the final published version.Android gives us opportunity to extract meaningful information from metadata. From the security point of view, the missing important information in metadata of an application could be a sign of suspicious application, which could be directed for extensive analysis. Especially the usage of dangerous permissions is expected to be explained in app descriptions. The permission-to-description fidelity problem in the literature aims to discover such inconsistencies between the usage of permissions and descriptions. This study proposes a new method based on natural language processing and recurrent neural networks. The effect of user reviews on finding such inconsistencies is also investigated in addition to application descriptions. The experimental results show that high precision is obtained by the proposed solution, and the proposed method could be used for triage of Android applications

    An x-band 6-bit active phase shifter

    Get PDF
    This paper presents a 6-bit active phase shifter using a new vector-sum method for X-band (8-12 GHz) phased arrays in 0.13 mu m SiGe BiCMOS process. An RC filter is used to generate two orthogonal vectors which are then fed into four VGAs, two using the common-base and two using the common-emitter topology. This generates 4 vectors of 0 degrees, 90 degrees, 180 degrees and 270 degrees which are scaled and added by varying the gains of the VGAs to generate any phase between 0-360 degrees. The gains of the VGAs are adjusted with analog voltage control using the current-steering method. The outputs of the VGAs are connected together with a common load in order to add the vectors in current-domain. The phase shifter achieves < 5.6 degrees RMS phase error over 8-12 GHz and < 3.1 degrees RMS phase error over 9-11 GHz. The phase shifter has a power consumption of 16.6 mW from a 2V supply. The chip size is 850 mu m x 532 mu m including the probing pads. These performance parameters are comparable with the state of the art of the technology in literature
    corecore