Search results for: security and growth for all in the region
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12927

Search results for: security and growth for all in the region

12657 EcoMush: Mapping Sustainable Mushroom Production in Bangladesh

Authors: A. A. Sadia, A. Emdad, E. Hossain

Abstract:

The increasing importance of mushrooms as a source of nutrition, health benefits, and even potential cancer treatment has raised awareness of the impact of climate-sensitive variables on their cultivation. Factors like temperature, relative humidity, air quality, and substrate composition play pivotal roles in shaping mushroom growth, especially in Bangladesh. Oyster mushrooms, a commonly cultivated variety in this region, are particularly vulnerable to climate fluctuations. This research explores the climatic dynamics affecting oyster mushroom cultivation and, presents an approach to address these challenges and provides tangible solutions to fortify the agro-economy, ensure food security, and promote the sustainability of this crucial food source. Using climate and production data, this study evaluates the performance of three clustering algorithms -KMeans, OPTICS, and BIRCH- based on various quality metrics. While each algorithm demonstrates specific strengths, the findings provide insights into their effectiveness for this specific dataset. The results yield essential information, pinpointing the optimal temperature range of 13°C-22°C, the unfavorable temperature threshold of 28°C and above, and the ideal relative humidity range of 75-85% with the suitable production regions in three different seasons: Kharif-1, 2, and Robi. Additionally, a user-friendly web application is developed to support mushroom farmers in making well-informed decisions about their cultivation practices. This platform offers valuable insights into the most advantageous periods for oyster mushroom farming, with the overarching goal of enhancing the efficiency and profitability of mushroom farming.

Keywords: climate variability, mushroom cultivation, clustering techniques, food security, sustainability, web-application

Procedia PDF Downloads 57
12656 Foreign Policy and National Security Dilemma: Examining Nigerian Experience

Authors: Shuaibu Umar Abdul

Abstract:

The essence of any state as well as government is to ensure and advance the security of lives and property of its citizens. As a result, providing security in all spheres ranging from safeguarding the territorial integrity, security of lives and property of the citizens as well as economic emancipation have constitute the core objectives cum national interest of virtually all country’s foreign policy in the world. In view of this imperative above, Nigeria has enshrined in the early part of her 1999 constitution as amended, as its duty and responsibility as a state, to ensure security of lives and property of its citizens. Yet, it does not make any significant shift as it relates to the country’s fundamental security needs as exemplified by the current enormous security challenges that reduced the country’s fortune to the background in all ramifications. The study chooses realist paradigm as theoretical underpinning which emphasizes that exigency of the moment should always take priority in the pursuit of foreign policy. The study is historical, descriptive and narrative in method and character. Data for the study was sourced from secondary sources and analysed via content analysis. The study found out that it is lack of political will on the side of the government to guarantee a just and egalitarian society that will be of benefit to all citizens. This could be more appreciated when looking at the gaps between the theory in Nigerian foreign policy and the practice as exemplified by the action or inaction of the government to ensure security in the state. On this account, the study recommends that until the leaderships in Nigerian foreign policy recognized the need for political will and respect for constitutionalism to ensure security of its citizens and territory, otherwise achieving great Nigeria will remain an illusion.

Keywords: foreign policy, nation, national security, Nigeria, security

Procedia PDF Downloads 505
12655 Food Security of Migrants in a Regional Area of Australia: A Qualitative Study

Authors: Joanne Sin Wei Yeoh, Quynh Lê, Rosa McManamey

Abstract:

Food security indicates the ability of individuals, households and communities to acquire food that is healthy, sustainable, affordable, appropriate and accessible. Despite Australia’s current ability to produce enough food to feed a population larger than its current population, there has been substantial evidence over the last decades to demonstrate many Australians struggle to feed themselves, including those from a cultural and linguistically diverse (CALD) background. The study aimed to investigate migrants’ perceptions and experiences on food security in Tasmania. Semi-structured interviews were conducted with 33 migrants residing in North, South and North West Tasmania, who were recruited through purposive sampling. Thematic analysis was employed to analyse the interview data. Four main themes were identified from the interview data: (1) Understanding of food security; (2) Experiences with the food security in Tasmania; (3) Factors that influence migrants’ food security in Tasmania; and (4) Acculturation strategies. Various sub-themes have emerged under each of these four major themes. Though the findings indicate participants are satisfied with their current food security in Tasmania, they still encounter some challenges in food availability, accessibility, and affordability in Tasmania. Factors that influence migrants’ food security were educational background, language barrier, socioeconomic status, geographical isolation, and cultural background. By using different acculturation strategies, migrants managed to adapt to the new food culture. In addition, social and cultural capitals were also treated as vital roles in improving migrants’ food security. The findings indicate migrants residing in Tasmania face different challenges on food security. They use different strategies for food security while acculturating into a new environment. The findings may provide useful information for migrants in Australia and various private organisations or relevant government departments that address food security for migrants.

Keywords: experiences, food security, migrants, perceptions

Procedia PDF Downloads 417
12654 Can Empowering Women Farmers Reduce Household Food Insecurity? Evidence from Malawi

Authors: Christopher Manyamba

Abstract:

Women in Malawi produce perform between 50-70 percent of all agricultural tasks and yet the majority remain food insecure. The aim of his paper is to build on existing mixed evidence that indicates that empowering women in agriculture is conducive to improving food security. The WEAI is used to provide evidence on the relationship between women’s empowerment in agriculture and household food security. A multinomial logistic regression is applied to the Women Empowerment in Agriculture Index (WEAI) components and the Household Hunger Scale. The overall results show that the WEAI can be used to determine household food insecurity; however it has to be contextually adapted. Assets ownership, credit, group membership and leisure time are positively associated with food security. Contrary to other literature, empowerment in having control and decisions on income indicate negative association with household food security. These results could potentially better inform public, private and civil society stakeholders’ dialogues in creating the most effective and sustainable interventions to help women attain long-term food security.

Keywords: food security, gender, empowerment, agriculture index, framework for African food security, household hunger scale

Procedia PDF Downloads 359
12653 A Study on Automotive Attack Database and Data Flow Diagram for Concretization of HEAVENS: A Car Security Model

Authors: Se-Han Lee, Kwang-Woo Go, Gwang-Hyun Ahn, Hee-Sung Park, Cheol-Kyu Han, Jun-Bo Shim, Geun-Chul Kang, Hyun-Jung Lee

Abstract:

In recent years, with the advent of smart cars and the expansion of the market, the announcement of 'Adventures in Automotive Networks and Control Units' at the DEFCON21 conference in 2013 revealed that cars are not safe from hacking. As a result, the HEAVENS model considering not only the functional safety of the vehicle but also the security has been suggested. However, the HEAVENS model only presents a simple process, and there are no detailed procedures and activities for each process, making it difficult to apply it to the actual vehicle security vulnerability check. In this paper, we propose an automated attack database that systematically summarizes attack vectors, attack types, and vulnerable vehicle models to prepare for various car hacking attacks, and data flow diagrams that can detect various vulnerabilities and suggest a way to materialize the HEAVENS model.

Keywords: automotive security, HEAVENS, car hacking, security model, information security

Procedia PDF Downloads 350
12652 VANETs: Security Challenges and Future Directions

Authors: Jared Oluoch

Abstract:

Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the network is secure. If security of the network is not guaranteed, several attacks can occur, thereby compromising the robustness, reliability, and efficiency of the network. This paper discusses existing security mechanisms and unique properties of connected vehicles. The methodology employed in this work is exploratory. The paper reviews existing security solutions for connected vehicles. More concretely, it discusses various cryptographic mechanisms available, and suggests areas of improvement. The study proposes a combination of symmetric key encryption and public key cryptography to improve security. The study further proposes message aggregation as a technique to overcome message redundancy. This paper offers a comprehensive overview of connected vehicles technology, its applications, its security mechanisms, open challenges, and potential areas of future research.

Keywords: VANET, connected vehicles, 802.11p, WAVE, DSRC, trust, security, cryptography

Procedia PDF Downloads 306
12651 Towards a Security Model against Denial of Service Attacks for SIP Traffic

Authors: Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla

Abstract:

Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.

Keywords: Denial-of-Service SIP attacks, MS-DoS-SIP, security model, VoIP-SIP vulnerabilities

Procedia PDF Downloads 195
12650 An Institutional Mapping and Stakeholder Analysis of ASEAN’s Preparedness for Nuclear Power Disaster

Authors: Nur Azha Putra Abdul Azim, Denise Cheong, S. Nivedita

Abstract:

Currently, there are no nuclear power reactors among the Association of Southeast Asian Nations (ASEAN) member states (AMS) but there are seven operational nuclear research reactors, and Indonesia is about to construct the region’s first experimental power reactor by the end of the decade. If successful, the experimental power reactor will lay the foundation for the country’s and region’s first nuclear power plant. Despite projecting confidence during the period of nuclear power renaissance in the region in the last decade, none of the AMS has committed to a political decision on the use of nuclear energy and this is largely due to the Fukushima nuclear power accident in 2011. Of the ten AMS, Vietnam, Indonesia and Malaysia have demonstrated the most progress in developing nuclear energy based on the nuclear power infrastructure development assessments made by the International Atomic Energy Agency. Of these three states, Vietnam came closest to building its first nuclear power plant but decided to delay construction further due to safety and security concerns. Meanwhile, Vietnam along with Indonesia and Malaysia continue with their nuclear power infrastructure development and the remaining SEA states, with the exception of Brunei and Singapore, continue to build their expertise and capacity for nuclear power energy. At the current rate of progress, Indonesia is expected to make a national decision on the use of nuclear power by 2023 while Malaysia, the Philippines, and Thailand have included the use of nuclear power in their mid to long-term power development plans. Vietnam remains open to nuclear power but has not placed a timeline. The medium to short-term power development projection in the region suggests that the use of nuclear energy in the region is a matter of 'when' rather than 'if'. In lieu of the prospects for nuclear energy in Southeast Asia (SEA), this presentation will review the literature on ASEAN radiological emergency and preparedness response (EPR) plans and examine ASEAN’s disaster management and emergency framework. Through a combination of institutional mapping and stakeholder analysis methods, which we examine in the context of the international EPR, and nuclear safety and security regimes, we will identify the issues and challenges in developing a regional radiological EPR framework in the SEA. We will conclude with the observation that ASEAN faces serious structural, institutional and governance challenges due to the AMS inherent political structures and history of interstate conflicts, and propose that ASEAN should either enlarge the existing scope of its disaster management and response framework or that its radiological EPR framework should exist as a separate entity.

Keywords: nuclear power, nuclear accident, ASEAN, Southeast Asia

Procedia PDF Downloads 145
12649 Effects of Egg Yolk Peptide on the Retardation of Bone Growth Induced by Low-Calcium Diets

Authors: Kang-Hyun Leem, Myung-Gyou Kim, Hye Kyung Kim

Abstract:

Eggs have long been an important contributor to the nutritional quality of the human, and recognized as a very valuable source of proteins for human nutrition. Egg yolk is composed of various important chemical substances for human health. Growth means not only the increase of body weight but also the elongation of height and the enlargement of each organ's anatomical and morphological size. A calcium shortage causes the growth retardation on the body growth. In this study, we examined the therapeutic effects of egg yolk peptide (EYP) on the retardation of the longitudinal bone growth induced by low-calcium diet (0.05%) in adolescent rats. Low calcium diets were administrated for 15 days. During the last five days, calcium and/or vitamin D and/or EYP were administrated. The body weights, longitudinal bone growth rates, the heights of growth plates, and bone morphogenetic protein (BMP)-2 and insulin-like growth factor (IGF)-1 expressions were measured using histochemical analysis. Low calcium diets caused the significant reduction in body weight gains and the longitudinal bone growth. The heights of growth plates and the expressions of BMP-2 and IGF-1 showed the impairment of body growth as well. Calcium and/or vitamin D administration could not significantly increase the longitudinal bone growth. However, calcium, vitamin D, and EYP administration significantly increased the bone growth, the growth plate height, and BMP-2 and IGF-1 expressions. These results suggest that EYP enhances the longitudinal bone growth in the calcium and/or vitamin D deficiency and it could be a promising agent for the treatment of children suffering from malnutrition.

Keywords: egg yolk peptide, low-calcium diet, longitudinal bone growth, morphogenetic protein-2, insulin-like growth factor-1, vitamin D

Procedia PDF Downloads 438
12648 A Biometric Template Security Approach to Fingerprints Based on Polynomial Transformations

Authors: Ramon Santana

Abstract:

The use of biometric identifiers in the field of information security, access control to resources, authentication in ATMs and banking among others, are of great concern because of the safety of biometric data. In the general architecture of a biometric system have been detected eight vulnerabilities, six of them allow obtaining minutiae template in plain text. The main consequence of obtaining minutia templates is the loss of biometric identifier for life. To mitigate these vulnerabilities several models to protect minutiae templates have been proposed. Several vulnerabilities in the cryptographic security of these models allow to obtain biometric data in plain text. In order to increase the cryptographic security and ease of reversibility, a minutiae templates protection model is proposed. The model aims to make the cryptographic protection and facilitate the reversibility of data using two levels of security. The first level of security is the data transformation level. In this level generates invariant data to rotation and translation, further transformation is irreversible. The second level of security is the evaluation level, where the encryption key is generated and data is evaluated using a defined evaluation function. The model is aimed at mitigating known vulnerabilities of the proposed models, basing its security on the impossibility of the polynomial reconstruction.

Keywords: fingerprint, template protection, bio-cryptography, minutiae protection

Procedia PDF Downloads 165
12647 Determinants of Dividend Payout Ratio: Evidence form MENA Region

Authors: Abdul-Nasser El-Kassar, Walid Elgammal, Hisham Jawhar

Abstract:

This paper studies the determinants of the dividends payout ratio. The factors affecting the dividends payout ratio are to be identified. The study focuses only on the cement and construction industry within the MENA region in an attempt to isolate any incoherent behavior. The factors under consideration are: sales growth, ROE, ROA, ROS, debt to equity ratio, firm size, and free cash flow. Data were collected from official stock exchange markets in addition to annual reports. The study considered all firms that paid dividend in each of the three consecutive years starting from 2010 till 2012. Out of the 123 listed firms that work in cement and construction industry in MENA region, only 19 paid dividends in the three consecutive years 2010-12. Our sample consists of the 19 firms (57 observations) which are selected according to purposive sampling. Moreover, the study uses the homogeneous subcategory within the purposive sampling since only similar firms in the construction industry had been examined. The outcome of the study provides a vital insight into the determinants of dividends payout ratio of companies in MENA region. The results showed that the dividend payout ratio has a strong and positive relationship with return on assets and strong but negative relationship with return on equity. On the other hand, the results detected weak relationships between dividend payout ratio and sale growth, debt to equity ratio, firm size, and free cash flow. The study suggests that board of directors tend to compensate shareholders and minimize the agency cost by distributing a high portion of profits in form of dividends whenever return on equity decreases. Also, when the performance of the firm improves, and hence return on assets increases, boards of directors are more generous in distributing profits.

Keywords: dividends payout ratio, profitability firm size, free cashflow, debt to equity ratio

Procedia PDF Downloads 360
12646 Finite Element and Experimental Investigation of Ductile Crack Growth of Surface Cracks

Authors: Osama A. Terfas, Abdelhakim A. Hameda, Abdusalam A. Alktiwi

Abstract:

An investigation on ductile crack growth of shallow semi-elliptical surface cracks with a/w=0.2, a/c=0.33 under bending was carried out, where a is the crack depth, w is the plate thickness and c is the crack length at surface. Finite element analysis and experiments were modelling and the crack growth model were verified with experimental data. The results showed that the initial crack shape was no longer maintained as the crack developed under ductile tearing. The maximum growth at the deepest point at early stages was stopped when the crack depth reached half thickness and growth occurred beneath surface. Excellent agreement in the crack shape patterns was observed between the experiments and the crack growth model.

Keywords: crack growth, ductile tearing, mean stress, surface cracks

Procedia PDF Downloads 478
12645 Immunohistochemical Expression of β-catenin and Epidermal Growth Factor Receptor in Adamantinomatous Craniopharyngioma

Authors: Ghada Esheba, Fatimah Alturkistani, Arwa Obaid, Ahdab Bashehab, Moayad Alturkistani

Abstract:

Introduction: Craniopharyngiomas (CPs) are rare epithelial tumors located mainly in the sellar/parasellar region. CPs have been classified histopathologically, genetically, clinically and prognostically into two distinctive subtypes: adamantinomatous and papillary variants. Aim: To examine the pattern of expression of both the β-catenin and epidermal growth factor receptor (EGFR) in surgically resected samples of adamantinomatous CP, and to asses for the possibility of using anti-EGFR in the management of ACP patients. Materials and methods: β-catenin and EGFR immunostaining was performed on paraffin-embedded tissue sections of 18 ACP cases. Result: 17 out of 18 cases (94%) of ACP exhibited strong nuclear/cytoplasmic expression of β-catenin, 15 (83%) of APC cases were positive for EGFR. Conclusion: Nuclear accumulation of β-catenin is a diagnostic hallmark of ACP. EGFR positivity in most cases of ACP could qualify the use of anti-EGFR therapy. 

Keywords: craniopharyngioma, adamantinomatous, papillary, epidermal growth factor receptor, B-catenin

Procedia PDF Downloads 221
12644 Human Development as an Integral Part of Human Security within the Responsibility to Rebuild

Authors: Themistoklis Tzimas

Abstract:

The proposed paper focuses on a triangular relationship, between human security, human development and responsibility to rebuild. This relationship constitutes the innovative contribution to the debate about human security. Human security constitutes a generic and legally binding notion, which orientates from an integrated approach the UN Charter principles and of the collective security system. Such an approach brings at the forefront of international law and of international relations not only states but non- state actors as well. Several doctrines attempt to implement the fore-mentioned approach among which the Responsibility to Protect- hereinafter R2P- doctrine and its aspect of Responsibility to Rebuild- hereinafter R2R. In this sense, R2P in general and R2R are supposed to be guided by human security imperatives. Human security because of its human- centered approach encompasses as an integral part of it, human development. Human development constitutes part of the backbone of human security, since it deals with the social and economic root- causes of the threats, which human security attempts to confront. In this sense, doctrines which orientate from human security, such as R2P and its R2R aspect should also take into account human development imperatives, in order to improve their efficiency. On the contrary though, R2R is more often linked with market- orientated policies, which are often imposed under transitional authorities, regardless of local needs. The implementation of such policies can be identified as a cause for striking failures in the framework of R2R. In addition it is a misinterpretation of the essence of human security and subsequently of R2P as well. The findings of the article, on the basis of the fore-mentioned argument is that a change must take place from a market- orientated misinterpretation of R2R to an approach attempting to implement human development doctrines, since the latter lie at the heart of human security and can be proven more effective in dealing with the root- causes of conflicts. Methodologically, the article begins with an examination of human security and of its binding nature on the basis of its orientation from the UN Charter. It also examines its significance in the framework of the collective security system. Then, follows the analysis of why and how human development constitutes an integral part of human security. At the next part it is proven that R2P in general and R2R more specifically constitute or should constitute an attempt to implement human security doctrines within the collective security system. Having built this triangular relationship it is argued that human development is proven to be the most suitable notion, so that the spirit of human security and the scopes of R2P are successfully implemented.

Keywords: human security, un charter, responsibility to protect, responsibility to rebuild, human development

Procedia PDF Downloads 274
12643 Human Security and Human Trafficking Related Corruption

Authors: Ekin D. Horzum

Abstract:

The aim of the proposal is to examine the relationship between human trafficking related corruption and human security. The proposal suggests that the human trafficking related corruption is about willingness of the states to turn a blind eye to the human trafficking cases. Therefore, it is important to approach human trafficking related corruption in terms of human security and human rights violation to find an effective way to fight against human trafficking. In this context, the purpose of this proposal is to examine the human trafficking related corruption as a safe haven in which trafficking thrives for perpetrators.

Keywords: human trafficking, human security, human rights, corruption, organized crime

Procedia PDF Downloads 471
12642 Magneto-Optical Properties in Transparent Region of Implanted Garnet Films

Authors: Lali Kalanadzde

Abstract:

We investigated magneto-optical Kerr effect in transparent region of implanted ferrite-garnet films for the (YBiCa)3(FeGe)5O12. The implantation process was carried out at room temperature by Ne+ ions with energy of 100 KeV and with various doses (0.5-2.5) 1014 ion/cm2. We discovered that slight deviation of the plane of external alternating magnetic field from plane of sample leads to appearance intensive magneto-optical maximum in transparent region of garnet films ħω=0.5-2.0 eV. In the proceeding, we have also found that the deviation of polarization plane from P- component of incident light leads to the appearance of the similar magneto-optical effects in this region. The research of magnetization processes in transparent region of garnet films showed that the formation of magneto-optical effects in region ħω=0.5-2.3 eV has a rather complex character.

Keywords: ferrite-garnet films, ion implantation, magneto-optical, thin films

Procedia PDF Downloads 298
12641 Optimizing the Passenger Throughput at an Airport Security Checkpoint

Authors: Kun Li, Yuzheng Liu, Xiuqi Fan

Abstract:

High-security standard and high efficiency of screening seem to be contradictory to each other in the airport security check process. Improving the efficiency as far as possible while maintaining the same security standard is significantly meaningful. This paper utilizes the knowledge of Operation Research and Stochastic Process to establish mathematical models to explore this problem. We analyze the current process of airport security check and use the M/G/1 and M/G/k models in queuing theory to describe the process. Then we find the least efficient part is the pre-check lane, the bottleneck of the queuing system. To improve passenger throughput and reduce the variance of passengers’ waiting time, we adjust our models and use Monte Carlo method, then put forward three modifications: adjust the ratio of Pre-Check lane to regular lane flexibly, determine the optimal number of security check screening lines based on cost analysis and adjust the distribution of arrival and service time based on Monte Carlo simulation results. We also analyze the impact of cultural differences as the sensitivity analysis. Finally, we give the recommendations for the current process of airport security check process.

Keywords: queue theory, security check, stochatic process, Monte Carlo simulation

Procedia PDF Downloads 196
12640 US-India Strategic Bargaining and Power Balancing in South Asia

Authors: Anila Syed, Manzoor Ahmad

Abstract:

The relationship between United States and India has transformed from estrangement to wider engagement since 2004. With the convergence of interests and shared values both the US and India came close towards each other and evolved strategic partnership through civil nuclear cooperation. This paper analyze the cost and benefit of strategic partnership with India for US, the impact of India’s emergence as regional power on South Asian balance of power and its impact on Pak-US relationship. It also focuses on security structure of the region and challenges for the US to maintain strategic partnership with two rival states (India and Pakistan). The work also gives some recommendations for balancing power in the region in order to ensure durable peace not only between India and Pakistan but also in south Asia.

Keywords: US-India strategic partnership, civil-nuclear cooperation, balance of power, impacts on Pak-US relationship

Procedia PDF Downloads 401
12639 A Framework for Security Risk Level Measures Using CVSS for Vulnerability Categories

Authors: Umesh Kumar Singh, Chanchala Joshi

Abstract:

With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensuring that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides a way to manage the growing threats to infrastructures or system. This paper proposes a framework for risk level estimation which uses vulnerability database National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) and the Common Vulnerability Scoring System (CVSS). The proposed framework measures the frequency of vulnerability exploitation; converges this measured frequency with standard CVSS score and estimates the security risk level which helps in automated and reasonable security management. In this paper equation for the Temporal score calculation with respect to availability of remediation plan is derived and further, frequency of exploitation is calculated with determined temporal score. The frequency of exploitation along with CVSS score is used to calculate the security risk level of the system. The proposed framework uses the CVSS vectors for risk level estimation and measures the security level of specific network environment, which assists system administrator for assessment of security risks and making decision related to mitigation of security risks.

Keywords: CVSS score, risk level, security measurement, vulnerability category

Procedia PDF Downloads 318
12638 Critical Study on the Sensitivity of Corrosion Fatigue Crack Growth Rate to Cyclic Waveform and Microstructure in Marine Steel

Authors: V. C. Igwemezie, A. N. Mehmanparast

Abstract:

The primary focus of this work is to understand how variations in the microstructure and cyclic waveform affect the corrosion fatigue crack growth (CFCG) in steel, especially in the Paris region of the da/dN vs. ΔK curve. This work is important because it provides fundamental information on the modelling, design, selection, and use of steels for various engineering applications in the marine environment. The corrosion fatigue tests data on normalized and thermomechanical control process (TMCP) ferritic-pearlitic steels by the authors were compared with several studies on different microstructures in the literature. The microstructures of these steels are radically different and general comparative fatigue crack growth resistance performance study on the effect of microstructure in these materials are very scarce and where available are limited to few studies. The results, for purposes of engineering application, in this study show less dependency of fatigue crack growth rate (FCGR) on yield strength, tensile strength, ductility, frequency and stress ratio in the range 0.1 – 0.7. The nature of the steel microstructure appears to be a major factor in determining the rate at which fatigue cracks propagate in the entire da/dN vs. ΔK sigmoidal curve. The study also shows that the sine wave shape is the most damaging fatigue waveform for ferritic-pearlitic steels. This tends to suggest that the test under sine waveform would be a conservative approach, regardless of the waveform for design of engineering structures.

Keywords: BS7910, corrosion-fatigue crack growth rate, cyclic waveform, microstructure, steel

Procedia PDF Downloads 146
12637 Orchids of Coastal Karnataka, India: Diversity, Trends in Population, Threats and Conservation Strategies

Authors: Sankaran Potti Narasimhan

Abstract:

Costal Karnataka is sandwiched between Arabian Sea and the biodiversity hotspot of Western Ghats. This has provided a rich vegetation, canopy and humidity for the sustainable growth and evolution of many orchid populations. Similar to many other biodiversity hostpot regions of India and the world, this region also faces threat from anthropogenic activities and climate change. Hence, there is a need to study the current orchid diversity and trends in population as well as an effective conservation strategy. Costal belt of Karnataka state of India extends over 325 kilometers and an area of 18,000 km2. The region encompasses two national parks such as the Anshi National Park and the Kudremukh National Park. The study regions also include two Wild Life Sanctuaries such as the Someshwara Wildlife Sanctuary and Mookambika Wildlife Sanctuary. The estimated number of orchids in the region includes 30 genera and 45 species. Both terrestrial and epiphytic orchids are found in this region. The region contains many red listed orchids such as Trias stocksii (Critically endangered), Eriad alzellii (Lower risk vulnerable) and Dendrobnium ovatum (Vulnerable). The important terrestrial orchids of the region are Geodorum, Habenaria, Lipparis, Malaxis, Nervilia, Pachystoma, Pectelis, Peristylus, Tropidia and Zeuxine. The epiphytic forms includes Acampe, Aerides, Bulbophyllum, Cleisostoma, Conchidum, Cottonia, Cymbidium, Dendronium, Eria, Flickingeria, Gastrochilus, Kingidium, Luisia, Oberonia, Phalaenopsis, Pholidota, Porpax, Rhynchostylis, Sirhookera and Trias. The current paper discusses the population strength and changes in the population structure of these orchids along with proposed conservation strategies.

Keywords: orchid diversity, bulbophyllum, dendrobium, orchid conservation

Procedia PDF Downloads 386
12636 Assessing the Efficacy of Network Mapping, Vulnerability Scanning, and Penetration Testing in Enhancing Security for Academic Networks

Authors: Kenny Onayemi

Abstract:

In an era where academic institutions increasingly rely on information technology, the security of academic networks has emerged as a paramount concern. This comprehensive study delves into the effectiveness of security practices, including network mapping, vulnerability scanning, and penetration testing, within academic networks. Leveraging data from surveys administered to faculty, staff, IT professionals and IT students in the university, the study assesses their familiarity with these practices, perceived effectiveness, and frequency of implementation. The findings reveal that a significant portion of respondents exhibit a strong understanding of network mapping, vulnerability scanning, and penetration testing, highlighting the presence of knowledgeable professionals within academic institutions. Additionally, active scanning using network scanning tools and automated vulnerability scanning tools emerge as highly effective methods. However, concerns arise as the respondents show that the academic institutions conduct these practices rarely or never. Notably, many respondents have reported significant vulnerabilities or security incidents through these security measures within their institution. This study concludes with recommendations to enhance network security awareness and practices among faculty, staff, IT personnel, and students, ultimately fortifying the security posture of academic networks in the digital age.

Keywords: network security, academic networks, vulnerability scanning, penetration testing, information security

Procedia PDF Downloads 48
12635 Characterization of Enterotoxigenic Escherichia coli CS6 Promoter

Authors: Mondal Indranil, Bhakat Debjyoti, Mukhopadayay Asish K., Chatterjee Nabendu S.

Abstract:

CS6 is the prevalent CF in our region and deciphering its molecular regulators would play a pivotal role in reducing the burden of ETEC pathogenesis. In prokaryotes, most of the genes are under the control of one operon and the promoter present upstream of the gene regulates the transcription of that gene. Here the promoter of CS6 was characterized by computational method and further analyzed by β-galactosidase assay and sequencing. Promoter constructs and deletions were prepared as required to analyze promoter activity. The effect of different additives on the CS6 promoter was analysed by the β-galactosidase assay. Bioinformatics analysis done by Softberry/BPROM predicted fur, lrp, and crp boxes, -10 and -35 region upstream of the CS6 gene. The promoter construction in no promoter plasmid pTL61T showed that region -573 to +1 is actually the promoter region as predicted. Sequential deletion of the region upstream of CS6 revealed that promoter activity remains the same when -573bp to -350bp is deleted. But after the deletion of the upstream region -350 bp to -255bp, promoter expression decreases drastically to 26%. Further deletion also decreases promoter activity up to a little range. So the region -355bp to -255bp holds the promoter sequence for the CS6 gene. Additives like iron, NaCl, etc., modulate promoter activity in a dose-dependent manner. From the promoter analysis, it can be said that the minimum region lies between -254 and +1. Important region(s) lies between -350 bp to -255 bp upstream in the promoter, which might have important elements needed to control CS6 gene expression.

Keywords: microbiology, promoter, colonization factor, ETEC

Procedia PDF Downloads 157
12634 Extending the AOP Joinpoint Model for Memory and Type Safety

Authors: Amjad Nusayr

Abstract:

Software security is a general term used to any type of software architecture or model in which security aspects are incorporated in this architecture. These aspects are not part of the main logic of the underlying program. Software security can be achieved using a combination of approaches, including but not limited to secure software designs, third part component validation, and secure coding practices. Memory safety is one feature in software security where we ensure that any object in memory has a valid pointer or a reference with a valid type. Aspect-Oriented Programming (AOP) is a paradigm that is concerned with capturing the cross-cutting concerns in code development. AOP is generally used for common cross-cutting concerns like logging and DB transaction managing. In this paper, we introduce the concepts that enable AOP to be used for the purpose of memory and type safety. We also present ideas for extending AOP in software security practices.

Keywords: aspect oriented programming, programming languages, software security, memory and type safety

Procedia PDF Downloads 122
12633 Using Eigenvalues and Eigenvectors in Population Growth and Stability Obtaining

Authors: Abubakar Sadiq Mensah

Abstract:

The Knowledge of the population growth of a nation is paramount to national planning. The population of a place is studied and a model developed over a period of time, Matrices is used to form model for population growth. The eigenvalue ƛ of the matrix A and its corresponding eigenvector X is such that AX = ƛX is calculated. The stable age distribution of the population is obtained using the eigenvalue and the characteristic polynomial. Hence, estimation could be made using eigenvalues and eigenvectors.

Keywords: eigenvalues, eigenvectors, population, growth/stability

Procedia PDF Downloads 512
12632 Data Security: An Enhancement of E-mail Security Algorithm to Secure Data Across State Owned Agencies

Authors: Lindelwa Mngomezulu, Tonderai Muchenje

Abstract:

Over the decades, E-mails provide easy, fast and timely communication enabling businesses and state owned agencies to communicate with their stakeholders and with their own employees in real-time. Moreover, since the launch of Microsoft office 365 and many other clouds based E-mail services, many businesses have been migrating from the on premises E-mail services to the cloud and more precisely since the beginning of the Covid-19 pandemic, there has been a significant increase of E-mails utilization, which then leads to the increase of cyber-attacks. In that regard, E-mail security has become very important in the E-mail transportation to ensure that the E-mail gets to the recipient without the data integrity being compromised. The classification of the features to enhance E-mail security for further from the enhanced cyber-attacks as we are aware that since the technology is advancing so at the cyber-attacks. Therefore, in order to maximize the data integrity we need to also maximize security of the E-mails such as enhanced E-mail authentication. The successful enhancement of E-mail security in the future may lessen the frequency of information thefts via E-mails, resulting in the data of South African State-owned agencies not being compromised.

Keywords: e-mail security, cyber-attacks, data integrity, authentication

Procedia PDF Downloads 127
12631 Design and Implementation of Security Middleware for Data Warehouse Signature, Framework

Authors: Mayada Al Meghari

Abstract:

Recently, grid middlewares have provided large integrated use of network resources as the shared data and the CPU to become a virtual supercomputer. In this work, we present the design and implementation of the middleware for Data Warehouse Signature, DWS Framework. The aim of using the middleware in our DWS framework is to achieve the high performance by the parallel computing. This middleware is developed on Alchemi.Net framework to increase the security among the network nodes through the authentication and group-key distribution model. This model achieves the key security and prevents any intermediate attacks in the middleware. This paper presents the flow process structures of the middleware design. In addition, the paper ensures the implementation of security for DWS middleware enhancement with the authentication and group-key distribution model. Finally, from the analysis of other middleware approaches, the developed middleware of DWS framework is the optimal solution of a complete covering of security issues.

Keywords: middleware, parallel computing, data warehouse, security, group-key, high performance

Procedia PDF Downloads 110
12630 Managing Education through, Effective School Community Relationships/Participation for National Security

Authors: Shehu S. Janguza

Abstract:

The need for national security cannot be over Emphasis, which should be pursued by any means. Thus the need for effective management of education through effective school community Relationship/participation. In preparing and implementing only effort to promote community involvement in manning Education, it is importance to understand the whole picture of community participation, how it works, what forms are used, what benefit it can yield and what we should expect in the process of carrying out the efforts finally emphasis will be made on how effective school community relationship/participation and lead to national security.

Keywords: community participation, managing, school community, national security

Procedia PDF Downloads 589
12629 The External Debt in the Context of Economic Growth: The Sample of Turkey

Authors: Ayşen Edirneligil, Mehmet Mucuk

Abstract:

In developing countries, one of the most important restrictions about the economic growth is the lack of national savings which are supposed to finance the investments. In order to overcome this restriction and achieve the higher rate of economic growth by increasing the level of output, countries choose the external borrowing. However, there is a dispute in the literature over the correlation between external debt and economic growth. The aim of this study is to examine the effects of external debt on Turkish economic growth by using VAR analysis with the quarterly data over the period of 2002:01-2014:04. In this respect, Johansen Cointegration Test, Impulse- Response Function and Variance Decomposition Tests will be used for analyses. Empirical findings show that there is no cointegration in the long run.

Keywords: external debt, economic growth, Turkish economy, time series analysis

Procedia PDF Downloads 393
12628 Market Integration in the ECCAS Sub-Region

Authors: Mouhamed Mbouandi Njikam

Abstract:

This work assesses the trade potential of countries in the Economic Community of Central Africa States (ECCAS). The gravity model of trade is used to evaluate the trade flows of member countries, and to compute the trade potential index of ECCAS during 1995-2010. The focus is on the removal of tariffs and non-tariff barriers in the sub-region. Estimates from the gravity model are used for the calculation of the sub-region’s commercial potential. Its three main findings are: (i) the background research shows a low level of integration in the sub-region and open economies; (ii) a low level of industrialization and diversification are the main factors reducing trade potential in the sub-region; (iii) the trade creation predominate on the deflections of trade between member countries.

Keywords: gravity model, ECCAS, trade flows, trade potential, regional cooperation

Procedia PDF Downloads 416