Search results for: cyber defense
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 726

Search results for: cyber defense

426 Efficiency, Effectiveness, and Technological Change in Armed Forces: Indonesian Case

Authors: Citra Pertiwi, Muhammad Fikruzzaman Rahawarin

Abstract:

Government of Indonesia had committed to increasing its national defense the budget up to 1,5 percent of GDP. However, the budget increase does not necessarily allocate efficiently and effectively. Using Data Envelopment Analysis (DEA), the operational units of Indonesian Armed Forces are considered as a proxy to measure those two aspects. The bootstrap technique is being used as well to reduce uncertainty in the estimation. Additionally, technological change is being measured as a nonstationary component. Nearly half of the units are being estimated as fully efficient, with less than a third is considered as effective. Longer and larger sets of data might increase the robustness of the estimation in the future.

Keywords: bootstrap, effectiveness, efficiency, DEA, military, Malmquist, technological change

Procedia PDF Downloads 300
425 The Challenge of Assessing Social AI Threats

Authors: Kitty Kioskli, Theofanis Fotis, Nineta Polemi

Abstract:

The European Union (EU) directive Artificial Intelligence (AI) Act in Article 9 requires that risk management of AI systems includes both technical and human oversight, while according to NIST_AI_RFM (Appendix C) and ENISA AI Framework recommendations, claim that further research is needed to understand the current limitations of social threats and human-AI interaction. AI threats within social contexts significantly affect the security and trustworthiness of the AI systems; they are interrelated and trigger technical threats as well. For example, lack of explainability (e.g. the complexity of models can be challenging for stakeholders to grasp) leads to misunderstandings, biases, and erroneous decisions. Which in turn impact the privacy, security, accountability of the AI systems. Based on the NIST four fundamental criteria for explainability it can also classify the explainability threats into four (4) sub-categories: a) Lack of supporting evidence: AI systems must provide supporting evidence or reasons for all their outputs. b) Lack of Understandability: Explanations offered by systems should be comprehensible to individual users. c) Lack of Accuracy: The provided explanation should accurately represent the system's process of generating outputs. d) Out of scope: The system should only function within its designated conditions or when it possesses sufficient confidence in its outputs. Biases may also stem from historical data reflecting undesired behaviors. When present in the data, biases can permeate the models trained on them, thereby influencing the security and trustworthiness of the of AI systems. Social related AI threats are recognized by various initiatives (e.g., EU Ethics Guidelines for Trustworthy AI), standards (e.g. ISO/IEC TR 24368:2022 on AI ethical concerns, ISO/IEC AWI 42105 on guidance for human oversight of AI systems) and EU legislation (e.g. the General Data Protection Regulation 2016/679, the NIS 2 Directive 2022/2555, the Directive on the Resilience of Critical Entities 2022/2557, the EU AI Act, the Cyber Resilience Act). Measuring social threats, estimating the risks to AI systems associated to these threats and mitigating them is a research challenge. In this paper it will present the efforts of two European Commission Projects (FAITH and THEMIS) from the HorizonEurope programme that analyse the social threats by building cyber-social exercises in order to study human behaviour, traits, cognitive ability, personality, attitudes, interests, and other socio-technical profile characteristics. The research in these projects also include the development of measurements and scales (psychometrics) for human-related vulnerabilities that can be used in estimating more realistically the vulnerability severity, enhancing the CVSS4.0 measurement.

Keywords: social threats, artificial Intelligence, mitigation, social experiment

Procedia PDF Downloads 56
424 A Survey in Techniques for Imbalanced Intrusion Detection System Datasets

Authors: Najmeh Abedzadeh, Matthew Jacobs

Abstract:

An intrusion detection system (IDS) is a software application that monitors malicious activities and generates alerts if any are detected. However, most network activities in IDS datasets are normal, and the relatively few numbers of attacks make the available data imbalanced. Consequently, cyber-attacks can hide inside a large number of normal activities, and machine learning algorithms have difficulty learning and classifying the data correctly. In this paper, a comprehensive literature review is conducted on different types of algorithms for both implementing the IDS and methods in correcting the imbalanced IDS dataset. The most famous algorithms are machine learning (ML), deep learning (DL), synthetic minority over-sampling technique (SMOTE), and reinforcement learning (RL). Most of the research use the CSE-CIC-IDS2017, CSE-CIC-IDS2018, and NSL-KDD datasets for evaluating their algorithms.

Keywords: IDS, imbalanced datasets, sampling algorithms, big data

Procedia PDF Downloads 317
423 Control of Helminthosporiosis in Oryza sativa Varieties Treated with 24-Epibrassinolide

Authors: Kuate Tueguem William Norbert, Ngoh Dooh Jules Patrice, Kone Sangou Abdou Nourou, Mboussi Serge Bertrand, Chewachang Godwill Mih, Essome Sale Charles, Djuissi Tohoto Doriane, Ambang Zachee

Abstract:

The objectives of this study were to evaluate the effects of foliar application of 24-epibrassinolide (EBR) on the development of rice helminthosporiosis caused by Bipolaris oryzae and its influence on the improvement of growth parameters and induction of the synthesis of defense substances in the rice plants. The experimental asset up involved a multifactorial split-plot with two varieties (NERICA 3 and local variety KAMKOU) and five treatments (T0: control, T1: EBR, T2: BANKO PLUS (fungicide), T3: NPK (chemical fertilizer), T4: mixture: NPK + BANKO PLUS + EBR) with three repetitions. Agro-morphological and epidemiological parameters, as well as substances for plant resistance, were evaluated over two growing seasons. The application of the EBR induced significant growth of the rice plants for the 2015 and 2016 growing seasons on the two varieties tested compared to the T0 treatment. At 74 days after sowing (DAS), NERICA 3 showed plant heights of 58.9 ± 5.4; 83.1 ± 10.4; 86.01 ± 9.4; 69.4 ± 11.1 and 87.12 ± 7.4 cm at T0; T1; T2; T3, and T4, respectively. Plant height for the variety KAMKOU varied from 87,12 ± 8,1; 88.1 ± 8.1 and 92.02 ± 6.3 cm in T1, T2, and T3 to 74.1 ± 8.6 and 74.21 ± 11.4 cm in T0 and T3. In accordance with the low rate of expansion of helminthosporiosis in experimental plots, EBR (T1) significantly reduced the development of the disease with severities of 0.0; 1.29, and 2.04%, respectively at 78; 92, and 111 DAS on the variety NERICA 3 compared with1; 3.15 and 3.79% in the control T0. The reduction of disease development/severity as a result of the application of EBR is due to the induction of acquired resistance of rice varieties through increased phenol (13.73 eqAG/mg/PMF) and total protein (117.89 eqBSA/mg/PMF) in the T1 treatment against 5.37 eqAG/mg/PMF and 104.97 eqBSA/mg/PMF in T0 for the NERICA 3 variety. Similarly, on the KAMKOU variety, 148.53 eqBSA/mg/PMF were protein and 6.10 eqAG/mg/PMF of phenol in T1. In summary, the results show the significant effect of EBR on plant growth, yield, synthesis of secondary metabolites and defense proteins, and disease resistance. The EBR significantly reduced losses of rice grains by causing an average gain of about 1.55 t/ha compared to the control and 1.00 t/ha compared to the NPK-based treatment for the two varieties studied. Further, the enzymatic activities of PPOs, POXs, and PR2s were higher in leaves from treated EBR-based plants. These results show that 24-epibrassinolide can be used in the control of helminthosporiosis of rice to reduce disease and increase yields.

Keywords: Oryza sativa, 24-epibrassinolide, helminthosporiosis, secondary metabolites, PR proteins, acquired resistance

Procedia PDF Downloads 182
422 Growth and Yield Response of an Indian Wheat Cultivar (HD 2967) to Ozone and Water Stress in Open-Top Chambers with Emphasis on Its Antioxidant Status, Photosynthesis and Nutrient Allocation

Authors: Annesha Ghosh, S. B. Agrawal

Abstract:

Agricultural sector is facing a serious threat due to climate change and exacerbation of different atmospheric pollutants. Tropospheric ozone (O₃) is considered as a dynamic air pollutant imposing substantial phytotoxicity to natural vegetations and agriculture worldwide. Naturally, plants are exposed to different environmental factors and their interactions. Amongst such interactions, studies related to O₃ and water stress are still rare. In the present experiment, wheat cultivar HD2967 were grown in open top chambers (OTC) under two O₃ concentration; ambient O₃ level (A) and elevated O₃ (E) (ambient + 20 ppb O₃) along with two different water supply; well-watered (W) and 50% water stress conditions (WS), with an aim to assess the individual and interactive effect of two most prevailing stress factors in Indo-Gangetic Plains of India. Exposure to elevated O₃ dose caused early senescence symptoms and reduction in growth and biomass of the test cultivar. The adversity was more pronounced under the combined effect of EWS. Significant reduction of stomatal conductance (gs) and assimilation rate were observed under combined stress condition compared to the control (AW). However, plants grown under individual stress conditions displayed higher gs, biomass, and antioxidant defense mechanism compared to the plants grown under the presence of combined stresses. Higher induction in most of the enzyme activities of catalase (CAT), ascorbate peroxidase (APX), glutathione reductase (GR), peroxidase (POD) and superoxide dismutase (SOD) was displayed by HD 2967 under EW while, under the presence of combined stresses (EWS), a moderate increment of APX and CAT activity was observed only at its vegetative phase. Furthermore, variations in nutrient uptake and redistribution to different plants parts were also observed in the present study. Reduction in water availability has checked nutrient uptake (N, K, P, Ca, Cu, Mg, Zn) in above-ground parts (leaf) and below-ground parts (root). On the other hand, carbon (C) accumulation with subsequent C-N ratio was observed to be higher in the leaves under EWS. Such major nutrient check and limitation in carbon fixation due to lower gs under combined stress conditions might have weakened the defense mechanisms of the test cultivar. Grain yield was significantly reduced under EWS followed by AWS and EW as compared to their control, exhibiting an additive effect on the grain yield.

Keywords: antioxidants, open-top chambers, ozone, water stress, wheat, yield

Procedia PDF Downloads 112
421 Immunoglobulin G Glycosylation Profile in Influenza and COVID-19 Infected Patients

Authors: Marina Kljaković-Gašpić Batinjan, Tea Petrović, Frano Vučković, Irzal Hadžibegović, Barbara Radovani, Ivana Jurin, Lovorka Đerek, Eva Huljev, Alemka Markotić, Ivica Lukšić, Irena Trbojević-Akmačić, Gordan Lauc, Ivan Gudelj, Rok Čivljak

Abstract:

Immunoglobulin G has essential role in defense against infectious diseases, but its role cannot be fully recognized without understanding of changes in its N-glycans attached to the Fc domain. We analyzed and compared total IgG glycome in plasma samples of patients with influenza, patients with COVID-19 and healthy controls. We found similarities in IgG glycosylation changes in COVID-19 survivors and influenza patients that could be the consequence of adequate immune response to enveloped viruses, while observed changes in deceased COVID-19 patients may indicate its deviation.

Keywords: COVID-19, glycosylation, immunoglobulin G, influenza, pneumonia, viral infection

Procedia PDF Downloads 160
420 Remote Sensing-Based Prediction of Asymptomatic Rice Blast Disease Using Hyperspectral Spectroradiometry and Spectral Sensitivity Analysis

Authors: Selvaprakash Ramalingam, Rabi N. Sahoo, Dharmendra Saraswat, A. Kumar, Rajeev Ranjan, Joydeep Mukerjee, Viswanathan Chinnasamy, K. K. Chaturvedi, Sanjeev Kumar

Abstract:

Rice is one of the most important staple food crops in the world. Among the various diseases that affect rice crops, rice blast is particularly significant, causing crop yield and economic losses. While the plant has defense mechanisms in place, such as chemical indicators (proteins, salicylic acid, jasmonic acid, ethylene, and azelaic acid) and resistance genes in certain varieties that can protect against diseases, susceptible varieties remain vulnerable to these fungal diseases. Early prediction of rice blast (RB) disease is crucial, but conventional techniques for early prediction are time-consuming and labor-intensive. Hyperspectral remote sensing techniques hold the potential to predict RB disease at its asymptomatic stage. In this study, we aimed to demonstrate the prediction of RB disease at the asymptomatic stage using non-imaging hyperspectral ASD spectroradiometer under controlled laboratory conditions. We applied statistical spectral discrimination theory to identify unknown spectra of M. Oryzae, the fungus responsible for rice blast disease. The infrared (IR) region was found to be significantly affected by RB disease. These changes may result in alterations in the absorption, reflection, or emission of infrared radiation by the affected plant tissues. Our research revealed that the protein spectrum in the IR region is impacted by RB disease. In our study, we identified strong correlations in the region (Amide group - I) around X 1064 nm and Y 1300 nm with the Lambda / Lambda derived spectra methods for protein detection. During the stages when the disease is developing, typically from day 3 to day 5, the plant's defense mechanisms are not as effective. This is especially true for the PB-1 variety of rice, which is highly susceptible to rice blast disease. Consequently, the proteins in the plant are adversely affected during this critical time. The spectral contour plot reveals the highly correlated spectral regions 1064 nm and Y 1300 nm associated with RB disease infection. Based on these spectral sensitivities, we developed new spectral disease indices for predicting different stages of disease emergence. The goal of this research is to lay the foundation for future UAV and satellite-based studies aimed at long-term monitoring of RB disease.

Keywords: rice blast, asymptomatic stage, spectral sensitivity, IR

Procedia PDF Downloads 81
419 Artificial Intelligence and Governance in Relevance to Satellites in Space

Authors: Anwesha Pathak

Abstract:

With the increasing number of satellites and space debris, space traffic management (STM) becomes crucial. AI can aid in STM by predicting and preventing potential collisions, optimizing satellite trajectories, and managing orbital slots. Governance frameworks need to address the integration of AI algorithms in STM to ensure safe and sustainable satellite activities. AI and governance play significant roles in the context of satellite activities in space. Artificial intelligence (AI) technologies, such as machine learning and computer vision, can be utilized to process vast amounts of data received from satellites. AI algorithms can analyse satellite imagery, detect patterns, and extract valuable information for applications like weather forecasting, urban planning, agriculture, disaster management, and environmental monitoring. AI can assist in automating and optimizing satellite operations. Autonomous decision-making systems can be developed using AI to handle routine tasks like orbit control, collision avoidance, and antenna pointing. These systems can improve efficiency, reduce human error, and enable real-time responsiveness in satellite operations. AI technologies can be leveraged to enhance the security of satellite systems. AI algorithms can analyze satellite telemetry data to detect anomalies, identify potential cyber threats, and mitigate vulnerabilities. Governance frameworks should encompass regulations and standards for securing satellite systems against cyberattacks and ensuring data privacy. AI can optimize resource allocation and utilization in satellite constellations. By analyzing user demands, traffic patterns, and satellite performance data, AI algorithms can dynamically adjust the deployment and routing of satellites to maximize coverage and minimize latency. Governance frameworks need to address fair and efficient resource allocation among satellite operators to avoid monopolistic practices. Satellite activities involve multiple countries and organizations. Governance frameworks should encourage international cooperation, information sharing, and standardization to address common challenges, ensure interoperability, and prevent conflicts. AI can facilitate cross-border collaborations by providing data analytics and decision support tools for shared satellite missions and data sharing initiatives. AI and governance are critical aspects of satellite activities in space. They enable efficient and secure operations, ensure responsible and ethical use of AI technologies, and promote international cooperation for the benefit of all stakeholders involved in the satellite industry.

Keywords: satellite, space debris, traffic, threats, cyber security.

Procedia PDF Downloads 65
418 Training as a Service for Electronic Warfare

Authors: Toan Vo

Abstract:

Electronic attacks, illegal drones, interference, and jamming are no longer capabilities reserved for a state-sponsored, near-peer adversary. The proliferation of jammers on auction websites has lowered the price of entry for electronics hobbyists and nefarious actors. To enable local authorities and enforcement bodies to keep up with these challenges, this paper proposes a training as a service model to quickly and economically train and equip police departments and local law enforcement agencies. Using the U.S Department of Defense’s investment in Electronic Warfare as a guideline, a large number of personnel can be trained on effective spectrum monitoring techniques using commercial equipment readily available on the market. Finally, this paper will examine the economic benefits to the test and measurement industry if the TaaS model is applied.

Keywords: training, electronic warfare, economics, law enforcement

Procedia PDF Downloads 97
417 Modern Trends in Pest Management Agroindustry

Authors: Amarjit S Tanda

Abstract:

Integrated Pest Management Technology (IPMT) offers a crop protection model with sustainable agriculture production with minimum damage to the environment and human health. A concept of agro-ecological crop protection seems unsuitable under dynamic environmental systems. To remedy this, we are proposing Genetically Engineered Crop Protection System (GECPS), as an alternate concept in IPMT that suggests how GE cultivars can be optimally put to the service of crop protection. Genetically engineered cultivars which are developed by gene editing biotechnology may provide a preventive defense against the insect pests and plant diseases, a suitable alternative crop system for blending in IPMT program, in the future agro-industry.

Keywords: integrated, pest, management, technology

Procedia PDF Downloads 68
416 A Review on Aluminium Metal Matric Composites

Authors: V. Singh, S. Singh, S. S. Garewal

Abstract:

Metal matrix composites with aluminum as the matrix material have been heralded as the next great development in advanced engineering materials. Aluminum metal matrix composites (AMMC) refer to the class of light weight high performance material systems. Properties of AMMCs can be tailored to the demands of different industrial applications by suitable combinations of matrix, reinforcement and processing route. AMMC finds its application in automotive, aerospace, defense, sports and structural areas. This paper presents an overview of AMMC material systems on aspects relating to processing, types and applications with case studies.

Keywords: aluminum metal matrix composites, applications of aluminum metal matrix composites, lighting material processing of aluminum metal matrix composites

Procedia PDF Downloads 458
415 Ethereum Based Smart Contracts for Trade and Finance

Authors: Rishabh Garg

Abstract:

Traditionally, business parties build trust with a centralized operating mechanism, such as payment by letter of credit. However, the increase in cyber-attacks and malicious hacking has jeopardized business operations and finance practices. Emerging markets, owing to their higher banking risks and bigger presence of digital financing, are looking forward to technology-driven solutions, financial inclusion and innovative working paradigms. Blockchain has the potential to enhance transaction transparency and supply chain traceability. It has captured a vast landscape with 200 million crypto users worldwide. Fintech and blockchain products are popping up across brokerage, digital wallets, exchanges, post-trade clearance, settlement, middleware, infrastructure, and base protocols.

Keywords: blockchain, distributed ledger technology, decentralized applications, ethereum, smart contracts, trade finance

Procedia PDF Downloads 145
414 Leadership in Future Operational Environment

Authors: M. Şimşek

Abstract:

Rapidly changing factors that affect daily life also affect operational environment and the way military leaders fulfill their missions. With the help of technological developments, traditional linearity of conflict and war has started to fade away. Furthermore, mission domain has broadened to include traditional threats, hybrid threats and new challenges of cyber and space. Considering the future operational environment, future military leaders need to adapt themselves to the new challenges of the future battlefield. But how to decide what kind of features of leadership are required to operate and accomplish mission in the new complex battlefield? In this article, the main aim is to provide answers to this question. To be able to find right answers, first leadership and leadership components are defined, and then characteristics of future operational environment are analyzed. Finally, leadership features that are required to be successful in redefined battlefield are explained.

Keywords: future operational environment, leadership, leadership components

Procedia PDF Downloads 431
413 The Incoherence of the Philosophers as a Defense of Philosophy against Theology

Authors: Edward R. Moad

Abstract:

Al-Ghazali’s Tahāfat al Falāsifa is widely construed as an attack on philosophy in favor of theological fideism. Consequently, he has been blamed for ‘death of philosophy’ in the Muslim world. ‘Falsifa’ however is not philosophy itself, but rather a range of philosophical doctrines mainly influenced by or inherited form Greek thought. In these terms, this work represents a defense of philosophy against what we could call ‘falsifical’ fideism. In the introduction, Ghazali describes his target audience as, not the falasifa, but a group of pretenders engaged in taqlid to a misconceived understanding of falasifa, including the belief that they were capable of demonstrative certainty in the field of metaphysics. He promises to use falsifa standards of logic (with which he independently agrees), to show that that the falasifa failed to demonstratively prove many of their positions. Whether or not he succeeds in that, the exercise of subjecting alleged proofs to critical scrutiny is quintessentially philosophical, while uncritical adherence to a doctrine, in the name of its being ‘philosophical’, is decidedly unphilosophical. If we are to blame the intellectual decline of the Muslim world on someone’s ‘bad’ way of thinking, rather than more material historical circumstances (which is already a mistake), then blame more appropriately rests with modernist Muslim thinkers who, under the influence of orientalism (and like Ghazali’s philosophical pretenders) mistook taqlid to the falasifa as philosophy itself. The discussion of the Tahāfut takes place in the context of an epistemic (and related social) hierarchy envisioned by the falasifa, corresponding to the faculties of the sense, the ‘estimative imagination’ (wahm), and the pure intellect, along with the respective forms of discourse – rhetoric, dialectic, and demonstration – appropriate to each category of that order. Al-Farabi in his Book of Letters describes a relation between dialectic and demonstration on the one hand, and theology and philosophy on the other. The latter two are distinguished by method rather than subject matter. Theology is that which proceeds dialectically, while philosophy is (or aims to be?) demonstrative. Yet, Al-Farabi tells us, dialectic precedes philosophy like ‘nourishment for the tree precedes its fruit.’ That is, dialectic is part of the process, by which we interrogate common and imaginative notions in the pursuit of clearly understood first principles that we can then deploy in the demonstrative argument. Philosophy is, therefore, something we aspire to through, and from a discursive condition of, dialectic. This stands in apparent contrast to the understanding of Ibn Sina, for whom one arrives at the knowledge of first principles through contact with the Active Intellect. It also stands in contrast to that of Ibn Rushd, who seems to think our knowledge of first principles can only come through reading Aristotle. In conclusion, based on Al-Farabi’s framework, Ghazali’s Tahafut is a truly an exercise in philosophy, and an effort to keep the door open for true philosophy in the Muslim mind, against the threat of a kind of developing theology going by the name of falsifa.

Keywords: philosophy, incoherence, theology, Tahafut

Procedia PDF Downloads 156
412 NSBS: Design of a Network Storage Backup System

Authors: Xinyan Zhang, Zhipeng Tan, Shan Fan

Abstract:

The first layer of defense against data loss is the backup data. This paper implements an agent-based network backup system used the backup, server-storage and server-backup agent these tripartite construction, and we realize the snapshot and hierarchical index in the NSBS. It realizes the control command and data flow separation, balances the system load, thereby improving the efficiency of the system backup and recovery. The test results show the agent-based network backup system can effectively improve the task-based concurrency, reasonably allocate network bandwidth, the system backup performance loss costs smaller and improves data recovery efficiency by 20%.

Keywords: agent, network backup system, three architecture model, NSBS

Procedia PDF Downloads 454
411 Study on Network-Based Technology for Detecting Potentially Malicious Websites

Authors: Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park

Abstract:

Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.

Keywords: Advanced Persistent Threat (APT), malware, network security, network packet, exploit kits

Procedia PDF Downloads 358
410 Combined Effect of Zinc Supplementation and Ascaridia galli Infection on Oxidative Status in Broiler Chicks

Authors: Veselin Nanev, Margarita Gabrashanska, Neli Tsocheva-Gaytandzieva

Abstract:

Ascaridiasis in chicks is one of the major causes for the reduction in body weights, higher mortality, and reduction in egg production, worse meat quantity, pathological lesions, blood losses, and secondary infections. It is responsible for economic losses to the poultry. Despite being economically important parasite, little work has been carried out on the role of antioxidants in the pathogenesis of ascaridiasis. Zinc is a trace elements with multiple functions and one of them is its antioxidant ability. The aim of this study was to investigate the combined effect of organic zinc compound (2Gly.ZnCl22H20) and Ascaridia galli infection on the antioxidant status of broiler chicks. The activity of antioxidant enzymes superoxide dismutase, glutathione peroxidase, the level of lipid peroxidation, expressed by malonyl dialdexyde and plasma zinc in chicks experimentally infected with Ascaridia galli was investigated. Parasite burden was studied as well. The study was performed on 80 broiler chicks, Cobb 500 hybrids. They were divided into four groups – 1st group – control (non-treated and non-infected, 2nd group – infected with embryonated eggs of A. galli and without treatment, 3rd group- only treated with 2Gly.ZnCl22H20 compound and gr. 4 - infected and supplemented with Zn-compound. The chicks in gr. 2 and 4 were infected orally with 450 embryonated eggs of A.galli on day 14 post infection. The chicks from gr. 3 and 4 received 40 mg Zn compound /kg of feed after the 1st week of age during 10 days. All chicks were similarly fed, managed and killed at 60 day p.i. Helminthological, biochemical and statistical methods were applied. Reduced plasma Zn content was observed in the infected chicks compared to controls. Zinc supplementation did not restored the lower Zn content. Cu, Zn-SOD was decreased significantly in the infected chicks compared to controls. The GPx – activity was significantly increased in the infected chicks than the controls. Increased GPx activity together with decreased Cu/ZnSOD activity revealed unbalanced antioxidant defense capacity. The increased MDA level in chicks and changes in the activity of the enzymes showed a development of oxidative stress during the infection with A.galli. Zn compound supplementation has been shown to influence the activity of both antioxidant enzymes (SOD, GPx) and reduced MDA in the infected chicks. Organic zinc supplementation improved the antioxidant defense and protect hosts from oxidant destruction, but without any effect on the parasite burden. The number of helminths was similar in both groups. Zn supplementation did not changed the number of parasites. Administration of oral 2Gly.ZnCl22H20 compound has been shown to be useful in chicks infected with A. galli by its improvement of their antioxidant potential.

Keywords: Ascaridia galli, antioxidants, broiler chicks, zinc supplementation

Procedia PDF Downloads 130
409 ISIS and Social Media

Authors: Neda Jebellie

Abstract:

New information and communication technologies (ICT) not only has revolutionized the world of communication but has also strongly impacted the state of international terrorism. Using the potential of social media, the new wave of terrorism easily can recruit new jihadi members, spread their violent ideology and garner financial support. IS (Islamic State) as the most dangerous terrorist group has already conquered a great deal of social media space and has deployed sophisticated web-based strategies to promote its extremist doctrine. In this respect the vastly popular social media are the perfect tools for IS to establish its virtual Caliphate (e-caliphate) and e-Ommah (e-citizen).Using social media to release violent videos of beheading journalists, burning their hostages alive and mass killing of prisoners are IS strategies to terrorize and subjugate its enemies. Several Twitter and Facebook accounts which are IS affiliations have targeted young generation of Muslims all around the world. In fact IS terrorists use modern resources of communication not only to share information and conduct operations but also justify their violent acts. The strict Wahhabi doctrine of ISIS is based on a fundamental interpretation of Islam in which religious war against non Muslims (Jihad) and killing infidels (Qatal) have been praised and recommended. Via social media IS disseminates its propaganda to inspire sympathizers across the globe. Combating this new wave of terrorism which is exploiting new communication technologies is the most significant challenge for authorities. Before the rise of internet and social media governments had to control only mosques and religious gathering such as Friday sermons(Jamaah Pray) to prevent spreading extremism among Muslims community in their country. ICT and new communication technologies have heighten the challenge of dealing with Islamic radicalism and have amplified its threat .According to the official reports even some of the governments such as UK have created a special force of Facebook warriors to engage in unconventional warfare in digital age. In compare with other terrorist groups, IS has effectively grasped social media potential. Their horrifying released videos on YouTube easily got viral and were re-twitted and shared by thousands of social media users. While some of the social media such as Twitter and Facebook have shut down many accounts alleged to IS but new ones create immediately so only blocking their websites and suspending their accounts cannot solve the problem as terrorists recreate new accounts. To combat cyber terrorism focusing on disseminating counter narrative strategies can be a solution. Creating websites and providing online materials to propagate peaceful and moderate interpretation of Islam can provide a cogent alternative to extremist views.

Keywords: IS-islamic state, cyber terrorism, social media, terrorism, information, communication technologies

Procedia PDF Downloads 483
408 An Architecture for New Generation of Distributed Intrusion Detection System Based on Preventive Detection

Authors: H. Benmoussa, A. A. El Kalam, A. Ait Ouahman

Abstract:

The design and implementation of intrusion detection systems (IDS) remain an important area of research in the security of information systems. Despite the importance and reputation of the current intrusion detection systems, their efficiency and effectiveness remain limited as they should include active defense approach to allow anticipating and predicting intrusions before their occurrence. Consequently, they must be readapted. For this purpose we suggest a new generation of distributed intrusion detection system based on preventive detection approach and using intelligent and mobile agents. Our architecture benefits from mobile agent features and addresses some of the issues with centralized and hierarchical models. Also, it presents advantages in terms of increasing scalability and flexibility.

Keywords: Intrusion Detection System (IDS), preventive detection, mobile agents, distributed architecture

Procedia PDF Downloads 577
407 Molecular Characterization of Arginine Sensing Response in Unravelling Host-Pathogen Interactions in Leishmania

Authors: Evanka Madan, Madhu Puri, Dan Zilberstein, Rohini Muthuswami, Rentala Madhubala

Abstract:

The extensive interaction between the host and pathogen metabolic networks decidedly shapes the outcome of infection. Utilization of arginine by the host and pathogen is critical for determining the outcome of pathogenic infection. Infections with L. donovani, an intracellular parasite, will lead to an extensive competition of arginine between the host and the parasite donovani infection. One of the major amino acid (AA) sensing signaling pathways in mammalian cells are the mammalian target of rapamycin complex I (mTORC1) pathway. mTORC1, as a sensor of nutrient, controls numerous metabolic pathways. Arginine is critical for mTORC1 activation. SLC38A9 is the arginine sensor for the mTORC1, being activated during arginine sufficiency. L. donovani transport arginine via a high-affinity transporter (LdAAP3) that is rapidly up-regulated by arginine deficiency response (ADR) in intracellular amastigotes. This study, to author’s best knowledge, investigates the interaction between two arginine sensing systems that act in the same compartment, the lysosome. One is important for macrophage defense, and the other is essential for pathogen virulence. We hypothesize that the latter modulates lysosome arginine to prevent host defense response. The work presented here identifies an upstream regulatory role of LdAAP3 in regulating the expression of SLC38A9-mTORC1 pathway, and consequently, their function in L. donovani infected THP-1 cells cultured in 0.1 mM and 1.5 mM arginine. It was found that in physiological levels of arginine (0.1 mM), infecting THP-1 with Leishmania leads to increased levels of SLC38A9 and mTORC1 via an increase in the expression of RagA. However, the reversal was observed with LdAAP3 mutants, reflecting the positive regulatory role of LdAAP3 on the host SLC38A9. At the molecular level, upon infection, mTORC1 and RagA were found to be activated at the surface of phagolysosomes which was found to form a complex with phagolysosomal localized SLC38A9. To reveal the relevance of SLC38A9 under physiological levels of arginine, endogenous SLC38A9 was depleted and a substantial reduction in the expression of host mTORC1, its downstream active substrate, p-P70S6K1 and parasite LdAAP3, was observed, thereby showing that silencing SLC38A9 suppresses ADR. In brief, to author’s best knowledge, these results reveal an upstream regulatory role of LdAAP3 in manipulating SLC38A9 arginine sensing in host macrophages. Our study indicates that intra-macrophage survival of L. donovani depends on the availability and transport of extracellular arginine. An understanding of the sensing pathway of both parasite and host will open a new perspective on the molecular mechanism of host-parasite interaction and consequently, as a treatment for Leishmaniasis.

Keywords: arginine sensing, LdAAP3, L. donovani, mTORC1, SLC38A9, THP-1

Procedia PDF Downloads 119
406 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking

Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye

Abstract:

The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.

Keywords: algorithm, cryptography, cryptosystem, network

Procedia PDF Downloads 339
405 Denial among Women Living with Cancer: An Exploratory Study to Understand the Consequences of Cancer and the Denial Mechanism

Authors: Judith Partouche-Sebban, Saeedeh Rezaee Vessal

Abstract:

Because of the rising number of new cases of cancer, especially among women, it is more than essential to better understand how women experience cancer in order to bring them adapted to support and care and enhance their well-being and patient experience. Cancer stands for a traumatic experience in which the diagnosis, its medical treatments, and the related side effects lead to deep physical and psychological changes that may arouse considerable stress and anxiety. In order to reduce these negative emotions, women tend to use various defense mechanisms, among which denial has been defined as the most frequent mechanism used by breast cancer patients. This study aims to better understand the consequences of the experience of cancer and their link with the adoption of a denial strategy. The empirical research was done among female cancer survivors in France. Since the topic of this study is relatively unexplored, a qualitative methodology and open-ended interviews were employed. In total, 25 semi-directive interviews were conducted with a female with different cancers, different stages of treatment, and different ages. A systematic inductive method was performed to analyze data. The content analysis enabled to highlight three different denial-related behaviors among women with cancer, which serve a self-protective function. First, women who expressed high levels of anxiety confessed they tended to completely deny the existence of their cancer immediately after the diagnosis of their illness. These women mainly exhibit many fears and a deep distrust toward the medical context and professionals. This coping mechanism is defined by the patient as being unconscious. Second, other women deliberately decided to deny partial information about their cancer, whether this information is related to the stages of the illness, the emotional consequences, or the behavioral consequences of the illness. These women use this strategy as a way to avoid the reality of the illness and its impact on the different aspects of their life as if cancer does not exist. Third, some women tend to reinterpret and give meaning to their cancer as a way to reduce its impact on their life. To this end, they may use magical thinking or positive reframing, or reinterpretation. Because denial may lead to delays in medical treatments, this topic deserves a deep investigation, especially in the context of oncology. As denial is defined as a specific defense mechanism, this study contributes to the existing literature in service marketing which focuses on emotions and emotional regulation in healthcare services which is a crucial issue. Moreover, this study has several managerial implications for healthcare professionals who interact with patients in order to implement better care and support for the patients.

Keywords: cancer, coping mechanisms, denial, healthcare services

Procedia PDF Downloads 79
404 Visual Odometry and Trajectory Reconstruction for UAVs

Authors: Sandro Bartolini, Alessandro Mecocci, Alessio Medaglini

Abstract:

The growing popularity of systems based on unmanned aerial vehicles (UAVs) is highlighting their vulnerability, particularly in relation to the positioning system used. Typically, UAV architectures use the civilian GPS, which is exposed to a number of different attacks, such as jamming or spoofing. This is why it is important to develop alternative methodologies to accurately estimate the actual UAV position without relying on GPS measurements only. In this paper, we propose a position estimate method for UAVs based on monocular visual odometry. We have developed a flight control system capable of keeping track of the entire trajectory travelled, with a reduced dependency on the availability of GPS signals. Moreover, the simplicity of the developed solution makes it applicable to a wide range of commercial drones. The final goal is to allow for safer flights in all conditions, even under cyber-attacks trying to deceive the drone.

Keywords: visual odometry, autonomous uav, position measurement, autonomous outdoor flight

Procedia PDF Downloads 212
403 Dinitrotoluene and Trinitrotoluene Measuring in Double-Base Solid Propellants

Authors: Z. H. Safari, M. Anbia, G. H. Kouzegari, R. Amirkhani

Abstract:

Toluene and Nitro derivatives are widely used in industry particularly in various defense applications. Tri-nitro-toluene derivative is a powerful basic explosive material that is a basis upon which to compare equivalent explosive power of similar materials. The aim of this paper is to measure the explosive power of these hazardous substances in fuels having different shelf-life and therefore optimizing their storage and maintenance. The methodology involves measuring the amounts of di- nitro- toluene and tri-nitro-toluene in the aged samples at 90 ° C by gas chromatography. Results show no significant difference in the concentration of the TNT compound over a given time while there was a significant difference in DNT compound over the same period. The underlying reason is attributed to the simultaneous production of the material with destruction of stabilizer.

Keywords: dinitrotoluene, trinitrotoluene, double-base solid propellants, artificial aging

Procedia PDF Downloads 399
402 LuMee: A Centralized Smart Protector for School Children who are Using Online Education

Authors: Lumindu Dilumka, Ranaweera I. D., Sudusinghe S. P., Sanduni Kanchana A. M. K.

Abstract:

This study was motivated by the challenges experienced by parents and guardians in ensuring the safety of children in cyberspace. In the last two or three years, online education has become very popular all over the world due to the Covid 19 pandemic. Therefore, parents, guardians and teachers must ensure the safety of children in cyberspace. Children are more likely to go astray and there are plenty of online programs are waiting to get them on the wrong track and also, children who are engaging in the online education can be distracted at any moment. Therefore, parents should keep a close check on their children's online activity. Apart from that, due to the unawareness of children, they tempt to share their sensitive information, causing a chance of being a victim of phishing attacks from outsiders. These problems can be overcome through the proposed web-based system. We use feature extraction, web tracking and analysis mechanisms, image processing and name entity recognition to implement this web-based system.

Keywords: online education, cyber bullying, social media, face recognition, web tracker, privacy data

Procedia PDF Downloads 81
401 A Machine Learning Approach to Detecting Evasive PDF Malware

Authors: Vareesha Masood, Ammara Gul, Nabeeha Areej, Muhammad Asif Masood, Hamna Imran

Abstract:

The universal use of PDF files has prompted hackers to use them for malicious intent by hiding malicious codes in their victim’s PDF machines. Machine learning has proven to be the most efficient in identifying benign files and detecting files with PDF malware. This paper has proposed an approach using a decision tree classifier with parameters. A modern, inclusive dataset CIC-Evasive-PDFMal2022, produced by Lockheed Martin’s Cyber Security wing is used. It is one of the most reliable datasets to use in this field. We designed a PDF malware detection system that achieved 99.2%. Comparing the suggested model to other cutting-edge models in the same study field, it has a great performance in detecting PDF malware. Accordingly, we provide the fastest, most reliable, and most efficient PDF Malware detection approach in this paper.

Keywords: PDF, PDF malware, decision tree classifier, random forest classifier

Procedia PDF Downloads 84
400 Eucalyptus camaldulensis Leaves Attacked by the Gall Wasp Leptocybe invasa: A Phyto-Volatile Constituents Study

Authors: Maged El-Sayed Mohamed

Abstract:

Eucalyptus camaldulensis is one on the most well-known species of the genus Eucalyptus in the Middle east, its importance relay on the high production of its unique volatile constituents which exhibits many medicinal and pharmacological activities. The gall-forming wasp (Leptocybe invasa) has recently come into sight as the main pest attacking E. camaldulensis and causing severe injury. The wasp lays its eggs in the petiole and midrib of leaves and stems of young shoots of E. camaldulensis, which leads to gall formation. Gall formation by L. invasa damages growing shoot and leaves of Eucalyptus, resulting in abscission of leaves and drying. AIM: This study is an attempt to investigate the effect of the gall wasp (Leptocybe invasa) attack on the volatile constitutes of E. camaldulensis. This could help in the control of this wasp through stimulating plant defenses or production of a new allelochemicals or insecticide. The study of volatile constitutes of Eucalyptus before and after attack by the wasp can help the re-use and recycle of the infected Eucalyptus trees for new pharmacological and medicinal activities. Methodology: The fresh gall wasp-attacked and healthy leaves (100 g each) were cut and immediately subjected to hydrodistillation using Clevenger-type apparatus for 3 hours. The volatile fractions isolated were analyzed using Gas chromatography/mass spectrometry (GC/MS). Kovat’s retention indices (RI) were calculated with respect to a set of co-injected standard hydrocarbons (C10-C28). Compounds were identified by comparing their spectral data and retention indices with Wiley Registry of Mass Spectral Data 10th edition (April 2013), NIST 11 Mass Spectral Library (NIST11/2011/EPA/NIH) and literature data. Results: Fifty-nine components representing 89.13 and 88.60% of the total volatile fraction content respectively were quantitatively analyzed. Twenty-six major compounds at an average concentration greater than 0.1 ± 0.02% have been used for the statistical comparison. From those major components, twenty-one were found in both the attacked and healthy Eucalyptus leaves’ fractions in different concentration and five components, mono terpene p-Mentha-2-4(8) diene and the sesquiterpenes δ-elemene, β-elemene, E-caryophyllene and Bicyclogermacrene, were unique and only produced in the attacked-leaves’ fraction. CONCLUSION: Newly produced components or those commonly found in the volatile fraction and changed in concentration could represent a part of the plant defense mechanisms or might be an element of the plant allelopathic and communication mechanisms. Identification of the components of the gall wasp-damaged leaves can help in their recycling for different physiological, pharmacological and medicinal uses.

Keywords: Eucalyptus camaldulensis, eucalyptus recycling, gall wasp, Leptocybe invasa, plant defense mechanisms, Terpene fraction

Procedia PDF Downloads 353
399 Technology Impact on the Challenge between Human Rights and Cyber Terrorism

Authors: Abanoub Zare Zakaria Herzalla

Abstract:

The link between terrorism and human rights has become a major challenge in the fight against terrorism around the world. This is based on the fact that terrorism and human rights are so closely linked that when the former starts, the latter are violated. This direct connection was recognized in the Vienna Declaration and Program of Action adopted by the World Conference on Human Rights in Vienna on June 25, 1993, which recognizes that acts of terrorism in all their forms and manifestations aim to destroy the human rights of people. Terrorism therefore represents an attack on our most basic human rights. To this end, the first part of this article focuses on the connections between terrorism and human rights and seeks to highlight the interdependence between these two concepts. The second part discusses the emerging concept of cyberterrorism and its manifestations. An analysis of the fight against cyberterrorism in the context of human rights is also carried out.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 41
398 A Deep Reinforcement Learning-Based Secure Framework against Adversarial Attacks in Power System

Authors: Arshia Aflaki, Hadis Karimipour, Anik Islam

Abstract:

Generative Adversarial Attacks (GAAs) threaten critical sectors, ranging from fingerprint recognition to industrial control systems. Existing Deep Learning (DL) algorithms are not robust enough against this kind of cyber-attack. As one of the most critical industries in the world, the power grid is not an exception. In this study, a Deep Reinforcement Learning-based (DRL) framework assisting the DL model to improve the robustness of the model against generative adversarial attacks is proposed. Real-world smart grid stability data, as an IIoT dataset, test our method and improves the classification accuracy of a deep learning model from around 57 percent to 96 percent.

Keywords: generative adversarial attack, deep reinforcement learning, deep learning, IIoT, generative adversarial networks, power system

Procedia PDF Downloads 27
397 Evaluation of Hepatic Antioxidant Changes in Ovine Dicrocoeliosis

Authors: Arash Jafari, Somaye Bahrami, Mohammad Hossein Razi Jalali

Abstract:

Dicrocoeliosis, caused by Dicrocoelium dendriticum is a hepatic parasitic disease of clinical and financial significance in ruminant breeding, which causes direct losses due to condemnation of parasitized livers. The purpose of our study was to assess the effects of natural dicrocoeliosis on the antioxidant defense capability of the liver in sheep. For this purpose, livers of 40 infected sheep with D. dendriticumalong with livers of 20 healthy (control) sheep were collected from animals slaughtered in Khuzestan province, Iran. An increase in malondialdehyde concentrations accompanied by decreased activities of SOD and GPX of infected liver was noticed when com-pared with control values. Our data indicate that through dicrocoeliosis insufficient scavenging of reactive oxygen species takes place and caused oxidative liver damage.

Keywords: Dicrocoelium dendriticum, lipid peroxidation, antioxidant enzyme, liver

Procedia PDF Downloads 661