Search results for: socially engineered attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1267

Search results for: socially engineered attacks

967 Evaluation of Security and Performance of Master Node Protocol in the Bitcoin Peer-To-Peer Network

Authors: Muntadher Sallal, Gareth Owenson, Mo Adda, Safa Shubbar

Abstract:

Bitcoin is a digital currency based on a peer-to-peer network to propagate and verify transactions. Bitcoin is gaining wider adoption than any previous crypto-currency. However, the mechanism of peers randomly choosing logical neighbors without any knowledge about underlying physical topology can cause a delay overhead in information propagation, which makes the system vulnerable to double-spend attacks. Aiming at alleviating the propagation delay problem, this paper introduces proximity-aware extensions to the current Bitcoin protocol, named Master Node Based Clustering (MNBC). The ultimate purpose of the proposed protocol, that are based on how clusters are formulated and how nodes can define their membership, is to improve the information propagation delay in the Bitcoin network. In MNBC protocol, physical internet connectivity increases, as well as the number of hops between nodes, decreases through assigning nodes to be responsible for maintaining clusters based on physical internet proximity. We show, through simulations, that the proposed protocol defines better clustering structures that optimize the performance of the transaction propagation over the Bitcoin protocol. The evaluation of partition attacks in the MNBC protocol, as well as the Bitcoin network, was done in this paper. Evaluation results prove that even though the Bitcoin network is more resistant against the partitioning attack than the MNBC protocol, more resources are needed to be spent to split the network in the MNBC protocol, especially with a higher number of nodes.

Keywords: Bitcoin network, propagation delay, clustering, scalability

Procedia PDF Downloads 95
966 Boko Haram Insurrection and Religious Revolt in Nigeria: An Impact Assessment-{2009-2015}

Authors: Edwin Dankano

Abstract:

Evident by incessant and sporadic attacks on Nigerians poise a serious threat to the unity of Nigeria, and secondly, the single biggest security nightmare to confront Nigeria since after amalgamation of the Southern and Northern protectorates by the British colonialist in 1914 is “Boko Haram” a terrorist organization also known as “Jama’atul Ahli Sunnah Lidda’wati wal Jihad”, or “people committed to the propagation of the Prophet’s teachings and jihad”. The sect also upholds an ideology translated as “Western Education is forbidden”, or rejection of Western civilization and institutions. By some estimates, more than 5,500 people were killed in Boko Haram attacks in 2014, and Boko Haram attacks have already claimed hundreds of lives and territories {caliphates}in early 2015. In total, the group may have killed more than 10,000 people since its emergence in the early 2000s. More than 1 million Nigerians have been displaced internally by the violence, and Nigerian refugee figures in neighboring countries continue to rise. This paper is predicated on secondary sources of data and anchored on the Huntington’s theory of clash of civilization. As such, the paper argued that the rise of Boko Haram with its violent disposition against Western values is a counter response to Western civilization that is fast eclipsing other civilizations. The paper posits that the Boko Haram insurrection going by its teachings, and destruction of churches is a validation of the propagation of the sect as a religious revolt which has resulted in dire humanitarian situation in Adamawa, Borno, Yobe, Bauchi, and Gombe states all in north eastern Nigeria as evident in human casualties, human right abuses, population displacement, refugee debacle, livelihood crisis, and public insecurity. The paper submits that the Nigerian state should muster the needed political will in terms of a viable anti-terrorism measures and build strong legitimate institutions that can adequately curb the menace of corruption that has engulfed the military hierarchy, respond proactively to the challenge of terrorism in Nigeria and should embrace a strategic paradigm shift from anti-terrorism to counter-terrorism as a strategy for containing the crisis that today threatens the secular status of Nigeria.

Keywords: Boko Haram, civilization, fundamentalism, Islam, religion revolt, terror

Procedia PDF Downloads 377
965 The Effects of T-Walls on Urban Landscape and Quality of Life and Anti-Terror Design Concept in Kabul, Afghanistan

Authors: Fakhrullah Sarwari, Hiroko Ono

Abstract:

Kabul city has suffered a lot in 40 years of conflict of civil war and “The war on terror”. After the invasion of Afghanistan by the United States of America and its allies in 2001, the Taliban was removed from operational power, but The Taliban and other terrorist groups remained in remote areas of the country, they started suicide attacks and bombings. Hence to protect from these attacks officials surrounded their office buildings and houses with concrete blast walls. It gives a bad landscape to the city and creates traffic congestions. Our research contains; questionnaire, reviewing Kabul Municipality documents and literature review. Questionnaires were distributed to Kabul citizens to find out how people feel by seeing the T-Walls on Kabul streets? And what problems they face with T-Walls. “The T-Walls pull down commission” of Kabul Municipality documents were reviewed to find out what caused the failure of this commission. A literature review has been done to compare Kabul with Washington D.C on how they designed the city against terrorism threat without turning the cities into lock down. Bogota city of Columbia urban happiness movement is reviewed and compared with Kabul. The finding of research revealed that citizens of Kabul want security but not at the expense of public realm and creating the architecture of fear. It also indicates that increasing the T-walls do not give secure feeling but instead; it increases terror, hatred and affect people’s optimism. At the end, a series of recommendation is suggested on the issue.

Keywords: anti-terror design, Kabul, T-Walls, urban happiness

Procedia PDF Downloads 140
964 Engineering Escherichia coli for Production of Short Chain Fatty Acid by Exploiting Fatty Acid Metabolic Pathway

Authors: Kamran Jawed, Anu Jose Mattam, Zia Fatma, Saima Wajid, Malik Z. Abdin, Syed Shams Yazdani

Abstract:

Worldwide demand of natural and sustainable fuels and chemicals have encouraged researchers to develop microbial platform for synthesis of short chain fatty acids as they are useful precursors to replace petroleum-based fuels and chemicals. In this study, we evaluated the role of fatty acid synthesis and β-oxidation cycle of Escherichia coli to produce butyric acid, a 4-carbon short chain fatty acid, with the help of three thioesterases, i.e., TesAT from Anaerococcus tetradius, TesBF from Bryantella formatexigens and TesBT from Bacteroides thetaiotaomicron. We found that E. coli strain transformed with gene for TesBT and grown in presence of 8 g/L glucose produced maximum butyric acid titer at 1.46 g/L, followed by that of TesBF at 0.85 g/L and TesAT at 0.12 g/L, indicating that these thioesterases were efficiently converting short chain fatty acyl-ACP intermediate of fatty acid synthesis pathway into the corresponding acid. The titer of butyric acid varied significantly depending upon the plasmid copy number and strain genotype. Deletion of genes for fatty acyl-CoA synthetase and acyl-CoA dehydrogenase, which are involved in initiating the fatty acid degradation cycle, and overexpression of FadR, which is a dual transcriptional regulator and exerts negative control over fatty acid degradation pathway, reduced up to 30% of butyric acid titer. This observation suggested that β-oxidation pathway is working synergistically with fatty acid synthesis pathway in production of butyric acid. Moreover, accelerating the fatty acid elongation cycle by overexpressing acetyl-CoA carboxyltransferase (Acc) and 3-hydroxy-acyl-ACP dehydratase (FabZ) or by deleting FabR, the transcription suppressor of elongation, did not improve the butyric acid titer, rather favored the long chain fatty acid production. Finally, a balance between cell growth and butyric acid production was achieved with the use of phosphorous limited growth medium and 14.3 g/L butyric acid, and 17.5 g/L total free fatty acids (FFAs) titer was achieved during fed-batch cultivation. We have engineered an E. coli strain which utilizes the intermediate of both fatty acid synthesis and degradation pathway, i.e. butyryl-ACP and -CoA, to produce butyric acid from glucose. The strategy used in this study resulted in highest reported titers of butyric acid and FFAs in engineered E. coli.

Keywords: butenoic acid, butyric acid, Escherichia coli, fed-batch fermentation, short chain fatty acids, thioesterase

Procedia PDF Downloads 347
963 Color Image Compression/Encryption/Contour Extraction using 3L-DWT and SSPCE Method

Authors: Ali A. Ukasha, Majdi F. Elbireki, Mohammad F. Abdullah

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. This paper is divided into two parts. This work interests with the color image which is decomposed into red, green and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using the key image that has same original size and are generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours from color images recovery can be obtained with accepted level of distortion using single step parallel contour extraction (SSPCE) method. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Color images and completely reconstructed without any distortion. Also shown that the analyzed algorithm has extremely large security against some attacks like salt and pepper and Jpeg compression. Its proof that the color images can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression and salt and peppers attacks, bitplanes decomposition, Arnold transform, color image, wavelet transform, lossless image encryption

Procedia PDF Downloads 494
962 Revenge: Dramaturgy and the Tragedy of Jihad

Authors: Myriam Benraad

Abstract:

On 5 July 2016, just days before the bloody terrorist attack on the Promenade des Anglais in Nice, the Al-Hayat media centre, one of the official propaganda branches of the Islamic State, broadcast a French nasheed which paid tribute to the Paris and Brussels attacks of November 2015 and March 2016. Entitled 'My Revenge', the terrorist anthem was of rare vehemence. It mentioned, sequentially, 'huddled bodies', in a reference to the civilian casualties of Western air strikes in the Iraqi-Syrian zone, 'explosive belts', 'sharp knives', 'large-calibre weapons' as well as 'localised targets'. France was accused of bearing the responsibility for the wave of attacks on its territory since the Charlie Hebdo massacre of January 2015 due to its 'ruthless war' against the Muslim world. Evoking an 'old aggression' and the 'crimes and spoliations' of which France has made itself guilty, the jihadist hymn depicted the rebirth of the caliphate as 'laudable revenge'. The notion of revenge has always been central to contemporary jihadism, understood both as a revolutionary ideology and a global militant movement. In recent years, the attacks carried out in Europe and elsewhere in the world have, for most, been claimed in its name. Whoever says jihad, says drama, yet few studies, if any, have looked at its dramatic and emotional elements, most notably its tragic vengefulness. This seems all the more astonishing that jihad is filled with drama; it could even be seen as a drama in its own right. The jihadists perform a script and take on roles inspired by their respective group’s culture (norms, values, beliefs, and symbols). The militants stage and perform such a script for a designated audience, either partisan, sympathising or hostile towards them and their cause. This research paper will examine the dramaturgy of jihadism and in particular, the genre that best characterises its violence: revenge tragedy. Theoretically, the research will rely on the tools of social movement theory and the sociology of emotions. Methodologically, it will draw from dramaturgical analysis and a combination of qualitative and quantitative tools to attain valuable observations of a number of developments, trends, and patterns. The choice has been made to focus mainly – however not exclusively – on the attacks which have taken place since 2001 in the European Union and more specific member states that have been significantly hit by jihadist terrorism. The research looks at a number of representative longitudinal samples identifying continuities and discontinuities, similarities, but also substantial differences. The preliminary findings tend to establish the relevance and validity of this approach in helping make better sense of sensitisation, mobilisation, and survival dynamics within jihadist groups, and motivations among individuals who have embraced violence. Besides, they illustrate their pertinence for counterterrorism policymakers and practitioners. Through drama, jihadist groups ensure the unceasing regeneration of their militant cause as well as their legitimation among their partisans. Without drama, and without the spectacular ideological staging of reality, they would not be able to maintain their attraction potential and power of persuasion.

Keywords: Jihadism, dramaturgy, revenge, tragedy

Procedia PDF Downloads 110
961 High Volume Fly Ash Concrete for Paver Blocks

Authors: Som Nath Sachdeva, Vanita Aggarwal, S. M. Gupta

Abstract:

Use of concrete paver blocks is becoming increasingly popular. They are used for paving of approaches, paths and parking areas including their application in pre-engineered buildings. This paper discusses the results of an experimental study conducted on Fly Ash Concrete with the aim to report its suitability for concrete paver blocks. In this study, the effect of varying proportions of fly ash, 20 % to 40 %, on compressive strength and flexural strength of concrete has been evaluated. The mix designs studied are M-30, M-35, M-40 and M-50. It is observed that all the fly ash based mixes are able to achieve the required compressive and flexural strengths. In comparison to control mixes, the compressive and flexural strengths of the fly ash based mixes are found to be slightly less at 7 days and 28 days and a little more at 90 days.

Keywords: fly ash concrete, paver blocks, compressive, flexural strength

Procedia PDF Downloads 383
960 Progressive Collapse of Cooling Towers

Authors: Esmaeil Asadzadeh, Mehtab Alam

Abstract:

Well documented records of the past failures of the structures reveals that the progressive collapse of structures is one of the major reasons for dramatic human loss and economical consequences. Progressive collapse is the failure mechanism in which the structure fails gradually due to the sudden removal of the structural elements. The sudden removal of some structural elements results in the excessive redistributed loads on the others. This sudden removal may be caused by any sudden loading resulted from local explosion, impact loading and terrorist attacks. Hyperbolic thin walled concrete shell structures being an important part of nuclear and thermal power plants are always prone to such terrorist attacks. In concrete structures, the gradual failure would take place by generation of initial cracks and its propagation in the supporting columns along with the tower shell leading to the collapse of the entire structure. In this study the mechanism of progressive collapse for such high raised towers would be simulated employing the finite element method. The aim of this study would be providing clear conceptual step-by-step descriptions of various procedures for progressive collapse analysis using commercially available finite element structural analysis software’s, with the aim that the explanations would be clear enough that they will be readily understandable and will be used by practicing engineers. The study would be carried out in the following procedures: 1. Provide explanations of modeling, simulation and analysis procedures including input screen snapshots; 2. Interpretation of the results and discussions; 3. Conclusions and recommendations.

Keywords: progressive collapse, cooling towers, finite element analysis, crack generation, reinforced concrete

Procedia PDF Downloads 456
959 From Forked Tongues to Tinkerbell Ears: Rethinking the Criminalization of Alternative Body Modification in the UK

Authors: Luci V. Hyett

Abstract:

The criminal law of England and Wales currently deems that a person cannot consent to the infliction of injury upon their own body, where the level of harm is considered to be Actual or Grevious. This renders the defence of consent of the victim as being unavailable to those persons carrying out an Alternative Body Modification procedure. However, the criminalization of consensual injury is more appropriately deemed as being categorized as an offense against public morality and not one against the person, which renders the State’s involvement in the autonomous choices of a consenting adult, when determining what can be done to one’s own body, an arbitrary one. Furthermore, to recognise in law that a person is capable of giving a valid consent to socially acceptable cosmetic interventions that largely consist of procedures designed to aesthetically please men and, not those of people who want to modify their bodies for other reasons means that patriarchal attitudes are continuing to underpin public repulsion and inhibit social acceptance of such practices. Theoretical analysis will begin with a juridical examination of R v M(B) [2019] QB 1 where the High Court determined that Alternative Body Modification was not a special category exempting a person so performing from liability for Grevious Bodily Harm using the defence of consent. It will draw from its reasoning which considered that ‘the removal of body parts were medical procedures being carried out for no medical reason by someone not qualified to carry them out’ which will form the basis of this enquiry. It will consider the philosophical work of Georgio Agamben when analysing whether the biopolitical climate in the UK, which places the optimization of the perfect, healthy body at the centre of political concern can explain why those persons who wish to engage in Alternative Body Modification are treated as the ‘Exception’ to that which is normal using the ‘no medical reason’ canon to justify criminalisation, rather than legitimising the industry through regulation. It will consider, through a feminist lens, the current conflict in law between traditional cosmetic interventions which alter one’s physical appearance for socially accepted aesthetic purposes such as those to the breast, lip and buttock and, modifications described as more outlandish such as earlobe stretching, tooth filing and transdermal implants to create horns and spikes under the skin. It will assert that ethical principles relating to the psychological impact of body modification described as ‘alternative’ is used as a means to exclude person’s seeking such a procedure from receiving safe and competent treatment via a registered cosmetic surgeon which leads to these increasingly popular surgery’s being performed in Tattoo parlours throughout the UK as an extension to other socially acceptable forms of self-modification such as piercings. It will contend that only by ‘inclusive exclusion’ will those ‘othered’ through ostracisation be welcomed into the fold of normality and this can only be achieved through recognition of alternative body modification as a legitimate cosmetic intervention, subject to the same regulatory framework as existing practice. This would assist in refocusing the political landscape by erring on the side of liberty rather than that of biology.

Keywords: biopolitics, body modification, consent, criminal law

Procedia PDF Downloads 89
958 Critical Analysis of the Caspian: The Role of Identity in Russia's Foreign Policy

Authors: Aidana Arynbek

Abstract:

This paper attempts to offer an alternative to the explanation of the politics of great powers in Caspian politics. Since many researchers have analysed the politics of great powers in the region with the focus on materialism, this paper attempts to bring a sociological inquiry into analysing inter-state behaviour. The constructivist concept of Alexander Wendt will be applied to analyse Russia’s relation with The United States, China and Iran; the main argument is emphasis on the power of ideational forces over material ones. Moreover, the innovative contribution of Wendt regarding the understanding of anarchy to the study of International Relations (IR) will be applied; in his words, ‘anarchy is what states make of it’. A neo-realist perspective implies that with the structure of international politics, Russia treats all great powers as rivals through engagement in power politics; however, Wendt’s approach is able to explain the reason behind the state’s behaviour towards power politics, and this is about not only international structure, but also identity. The understanding of identity answers the question of how Russia came about to follow different actions in relation to Iran and China in contrast to The United States. This paper will be divided into five chapters. The first chapter will explain the constructivism of Alexander Wendt; the second chapter will give a brief background to The Caspian Sea Region (CSR); the third chapter will explain the formation of Russia’s identity towards The United States, and this will be applied to analyse Russia’s relation to The U.S in The CSR. Similarly with China, the fourth chapter will explain Russia’s identity and its relations in The CSR, and finally, the fifth chapter will show Russia’s identity towards Iran and its relation to Iran in The CSR. It will be concluded that the analysis of the politics between great powers in seeking to access one of the richest regions, The Caspian Basin, will show that international politics is not fixed, but constructed by human action and cognition. Reality in the politics of great powers in The Caspian Sea Region is socially constructed. This paper is not interested in how things are, but how they became what they are. That is to say, how Russia’s foreign policies towards great powers became what they are.

Keywords: Alexander Wendt, Caspian sea, identity, Russia, socially constructed

Procedia PDF Downloads 274
957 A Case-Study Analysis on the Necessity of Testing for Cyber Risk Mitigation on Maritime Transport

Authors: Polychronis Kapalidis

Abstract:

In recent years, researchers have started to turn their attention to cyber security and maritime security independently, neglecting, in most cases, to examine the areas where these two critical issues are intertwined. The impact of cybersecurity issues on the maritime economy is emerging dramatically. Maritime transport and all related activities are conducted by technology-intensive platforms, which today rely heavily on information systems. The paper’s argument is that when no defense is completely effective against cyber attacks, it is vital to test responses to the inevitable incursions. Hence, preparedness in the form of testing existing cybersecurity structure via different tools for potential attacks is vital for minimizing risks. Traditional criminal activities may further be facilitated and evolved through the misuse of cyberspace. Kidnap, piracy, fraud, theft of cargo and imposition of ransomware are the major of these activities that mainly target the industry’s most valuable asset; the ship. The paper, adopting a case-study analysis, based on stakeholder consultation and secondary data analysis, namely policy and strategic-related documentation, presents the importance of holistic testing in the sector. Arguing that poor understanding of the issue leads to the adoption of ineffective policies the paper will present the level of awareness within the industry and assess the risks and vulnerabilities of ships to these cybercriminal activities. It will conclude by suggesting that testing procedures must be focused on three main pillars within the maritime transport sector: the human factor, the infrastructure, and the procedures.

Keywords: cybercrime, cybersecurity, organized crime, risk mitigation

Procedia PDF Downloads 134
956 Investigating The Use Of Socially Assistive Robots To Support Learner Engagement For Students With Learning Disabilities In One-to-one Instructional Settings

Authors: Jennifer Fane, Mike Gray, Melissa Sager

Abstract:

Children with diagnosed or suspected learning disabilities frequently experience significant skill gaps in foundational learning areas such as reading, writing, and math. Remedial one-to-one instruction is a highly effective means of supporting children with learning differences in building these foundational skills and closing the learning gap between them and their same-age peers. However, due to the learning challenges children with learning disabilities face, and ensuing challenges with self-confidence, many children with learning differences struggle with motivation and self-regulation within remedial one-to-one learning environments - despite the benefits of these sessions. Socially Assistive Robots (SARs) are an innovative educational technology tool that has been trialled in a range of educational settings to support diverse learning needs. Yet, little is known about the impact of SARs on the learning of children with learning differences in a one-to-one remedial instructional setting. This study sought to explore the impact of SARs on the engagement of children (n=9) with learning differences attending one-to-one remedial instruction sessions at a non-profit remedial education provider. The study used a mixed-methods design to explore learner engagement during learning tasks both with and without the use of a SAR to investigate how the use of SARs impacts student learning. The study took place over five weeks, with each session within the study followed the same procedure with the SAR acting as a teaching assistant when in use. Data from the study included analysis of time-sample video segments of the instructional sessions, instructor recorded information about the student’s progress towards their session learning goal and student self-reported mood and energy levels before and after the session. Analysis of the findings indicates that the use of SARs resulted in fewer instances of off-task behaviour and less need for instructor re-direction during learning tasks, allowing students to work in more sustained ways towards their learning goals. This initial research indicates that the use of SARs does have a material and measurable impact on learner engagement for children with learning differences and that further exploration of the impact of SARs during one-to-one remedial instruction is warranted.

Keywords: engagement, learning differences, learning disabilities, instruction, social robotics.

Procedia PDF Downloads 190
955 Moving Target Defense against Various Attack Models in Time Sensitive Networks

Authors: Johannes Günther

Abstract:

Time Sensitive Networking (TSN), standardized in the IEEE 802.1 standard, has been lent increasing attention in the context of mission critical systems. Such mission critical systems, e.g., in the automotive domain, aviation, industrial, and smart factory domain, are responsible for coordinating complex functionalities in real time. In many of these contexts, a reliable data exchange fulfilling hard time constraints and quality of service (QoS) conditions is of critical importance. TSN standards are able to provide guarantees for deterministic communication behaviour, which is in contrast to common best-effort approaches. Therefore, the superior QoS guarantees of TSN may aid in the development of new technologies, which rely on low latencies and specific bandwidth demands being fulfilled. TSN extends existing Ethernet protocols with numerous standards, providing means for synchronization, management, and overall real-time focussed capabilities. These additional QoS guarantees, as well as management mechanisms, lead to an increased attack surface for potential malicious attackers. As TSN guarantees certain deadlines for priority traffic, an attacker may degrade the QoS by delaying a packet beyond its deadline or even execute a denial of service (DoS) attack if the delays lead to packets being dropped. However, thus far, security concerns have not played a major role in the design of such standards. Thus, while TSN does provide valuable additional characteristics to existing common Ethernet protocols, it leads to new attack vectors on networks and allows for a range of potential attacks. One answer to these security risks is to deploy defense mechanisms according to a moving target defense (MTD) strategy. The core idea relies on the reduction of the attackers' knowledge about the network. Typically, mission-critical systems suffer from an asymmetric disadvantage. DoS or QoS-degradation attacks may be preceded by long periods of reconnaissance, during which the attacker may learn about the network topology, its characteristics, traffic patterns, priorities, bandwidth demands, periodic characteristics on links and switches, and so on. Here, we implemented and tested several MTD-like defense strategies against different attacker models of varying capabilities and budgets, as well as collaborative attacks of multiple attackers within a network, all within the context of TSN networks. We modelled the networks and tested our defense strategies on an OMNET++ testbench, with networks of different sizes and topologies, ranging from a couple dozen hosts and switches to significantly larger set-ups.

Keywords: network security, time sensitive networking, moving target defense, cyber security

Procedia PDF Downloads 45
954 Counter-Terrorism and De-Radicalization as Soft Strategies in Combating Terrorism in Indonesia: A Critical Review

Authors: Tjipta Lesmana

Abstract:

Terrorist attacks quickly penetrated Indonesia following the downfall of Soeharto regime in May 1998. Reform era was officially proclaimed. Indonesia turned to 'heaven state' from 'authoritarian state'. For the first time since 1966, the country experienced a full-scale freedom of expression, including freedom of the press, and heavy acknowledgement of human rights practice. Some religious extremists previously run away to neighbor countries to escape from security apparatus secretly backed home. Quickly they consolidated the power to continue their long aspiration and dream to establish 'Shariah Indonesia', Indonesia based on Khilafah ideology. Bali bombings I which shocked world community occurred on 12 October 2002 in the famous tourist district of Kuta on the Indonesian island of Bali, killing 202 people (including 88 Australians, 38 Indonesians, and people from more than 20 other nationalities). In the capital, Jakarta, successive bombings were blasted in Marriott hotel, Australian Embassy, residence of the Philippine Ambassador and stock exchange office. A 'drunken Indonesia' is far from ready to combat nationwide sudden and massive terrorist attacks. Police Detachment 88 (Densus 88) Indonesian counter-terrorism squad, was quickly formed following 2002 Bali Bombing. Anti-terrorism Provisional Act was immediately erected, as well, due to urgent need to fight terrorism. Some Bali bombings criminals were deadly executed after sentenced by the court. But a series of terrorist suicide attacks and another Bali bombings (the second one) in Bali, again, shocked world community. Terrorism network is undoubtedly spreading nationwide. Suspicion is high that they had close connection with Al Qaeda’s groups. Even 'Afghanistan alumni' and 'Syria alumni' returned to Indonesia to back up the local mujahidins in their fights to topple Indonesia constitutional government and set up Islamic state (Khilafah). Supported by massive aids from friendly nations, especially Australia and United States, Indonesia launched large scale operations to crush terrorism consisted of various radical groups such as JAD, JAS, and JAADI. Huge energy, money, and souls were dedicated. Terrorism is, however, persistently entrenched. High ranking officials from Detachment 88 squad and military intelligence believe that terrorism is still one the most deadly enemy of Indonesia.

Keywords: counter-radicalization, de-radicalization, Khalifah, Union State, Al Qaedah, ISIS

Procedia PDF Downloads 152
953 Effectiveness of the Community Health Assist Scheme in Reducing Market Failure in Singapore’s Healthcare Sector

Authors: Matthew Scott Lau

Abstract:

This study addresses the research question: How effective has the Community Health Assist Scheme (CHAS) been in reducing market failure in Singapore’s healthcare sector? The CHAS policy, introduced in 2012 in Singapore, aims to improve accessibility and affordability of healthcare by offering subsidies to low and middle-income groups and elderly individuals for general practice consultations and healthcare. The investigation was undertaken by acquiring and analysing primary and secondary research data from 3 main sources, including handwritten survey responses of 334 individuals who were valid CHAS subsidy recipients (CHAS cardholders) from 5 different locations in Singapore, interview responses from two established general practitioner doctors with working knowledge of the scheme, and information from literature available online. Survey responses were analysed to determine how CHAS has affected the affordability and consumption of healthcare, and other benefits or drawbacks for CHAS users. The interview responses were used to explain the benefits of healthcare consumption and provide different perspectives on the impacts of CHAS on the various parties involved. Online sources provided useful information on changes in healthcare consumerism and Singapore’s government policies. The study revealed that CHAS has been largely effective in reducing market failure as the subsidies granted to consumers have improved the consumption of healthcare. This has allowed for the external benefits of healthcare consumption to be realized, thus reducing market failure. However, the study also revealed that CHAS cannot be fully effective in reducing market failure as the scope of CHAS prevents healthcare consumption from fully reaching the socially optimal level. Hence, the study concluded that CHAS has been effective to a large extent in reducing market failure in Singapore’s healthcare sector, albeit with some benefits to third parties yet to be realised. There are certain elements of the investigation, which may limit the validity of the conclusion, such as the means used to determine the socially optimal level of healthcare consumption, and the survey sample size.

Keywords: healthcare consumption, health economics, market failure, subsidies

Procedia PDF Downloads 139
952 Cybersecurity Challenges in the Era of Open Banking

Authors: Krish Batra

Abstract:

The advent of open banking has revolutionized the financial services industry by fostering innovation, enhancing customer experience, and promoting competition. However, this paradigm shift towards more open and interconnected banking ecosystems has introduced complex cybersecurity challenges. This research paper delves into the multifaceted cybersecurity landscape of open banking, highlighting the vulnerabilities and threats inherent in sharing financial data across a network of banks and third-party providers. Through a detailed analysis of recent data breaches, phishing attacks, and other cyber incidents, the paper assesses the current state of cybersecurity within the open banking framework. It examines the effectiveness of existing security measures, such as encryption, API security protocols, and authentication mechanisms, in protecting sensitive financial information. Furthermore, the paper explores the regulatory response to these challenges, including the implementation of standards such as PSD2 in Europe and similar initiatives globally. By identifying gaps in current cybersecurity practices, the research aims to propose a set of robust, forward-looking strategies that can enhance the security and resilience of open banking systems. This includes recommendations for banks, third-party providers, regulators, and consumers on how to mitigate risks and ensure a secure open banking environment. The ultimate goal is to provide stakeholders with a comprehensive understanding of the cybersecurity implications of open banking and to outline actionable steps for safeguarding the financial ecosystem in an increasingly interconnected world.

Keywords: open banking, financial services industry, cybersecurity challenges, data breaches, phishing attacks, encryption, API security protocols, authentication mechanisms, regulatory response, PSD2, cybersecurity practices

Procedia PDF Downloads 29
951 Prospects of Acellular Organ Scaffolds for Drug Discovery

Authors: Inna Kornienko, Svetlana Guryeva, Natalia Danilova, Elena Petersen

Abstract:

Drug toxicity often goes undetected until clinical trials, the most expensive and dangerous phase of drug development. Both human cell culture and animal studies have limitations that cannot be overcome by improvements in drug testing protocols. Tissue engineering is an emerging alternative approach to creating models of human malignant tumors for experimental oncology, personalized medicine, and drug discovery studies. This new generation of bioengineered tumors provides an opportunity to control and explore the role of every component of the model system including cell populations, supportive scaffolds, and signaling molecules. An area that could greatly benefit from these models is cancer research. Recent advances in tissue engineering demonstrated that decellularized tissue is an excellent scaffold for tissue engineering. Decellularization of donor organs such as heart, liver, and lung can provide an acellular, naturally occurring three-dimensional biologic scaffold material that can then be seeded with selected cell populations. Preliminary studies in animal models have provided encouraging results for the proof of concept. Decellularized Organs preserve organ microenvironment, which is critical for cancer metastasis. Utilizing 3D tumor models results greater proximity of cell culture morphological characteristics in a model to its in vivo counterpart, allows more accurate simulation of the processes within a functioning tumor and its pathogenesis. 3D models allow study of migration processes and cell proliferation with higher reliability as well. Moreover, cancer cells in a 3D model bear closer resemblance to living conditions in terms of gene expression, cell surface receptor expression, and signaling. 2D cell monolayers do not provide the geometrical and mechanical cues of tissues in vivo and are, therefore, not suitable to accurately predict the responses of living organisms. 3D models can provide several levels of complexity from simple monocultures of cancer cell lines in liquid environment comprised of oxygen and nutrient gradients and cell-cell interaction to more advanced models, which include co-culturing with other cell types, such as endothelial and immune cells. Following this reasoning, spheroids cultivated from one or multiple patient-derived cell lines can be utilized to seed the matrix rather than monolayer cells. This approach furthers the progress towards personalized medicine. As an initial step to create a new ex vivo tissue engineered model of a cancer tumor, optimized protocols have been designed to obtain organ-specific acellular matrices and evaluate their potential as tissue engineered scaffolds for cultures of normal and tumor cells. Decellularized biomatrix was prepared from animals’ kidneys, urethra, lungs, heart, and liver by two decellularization methods: perfusion in a bioreactor system and immersion-agitation on an orbital shaker with the use of various detergents (SDS, Triton X-100) in different concentrations and freezing. Acellular scaffolds and tissue engineered constructs have been characterized and compared using morphological methods. Models using decellularized matrix have certain advantages, such as maintaining native extracellular matrix properties and biomimetic microenvironment for cancer cells; compatibility with multiple cell types for cell culture and drug screening; utilization to culture patient-derived cells in vitro to evaluate different anticancer therapeutics for developing personalized medicines.

Keywords: 3D models, decellularization, drug discovery, drug toxicity, scaffolds, spheroids, tissue engineering

Procedia PDF Downloads 272
950 Degradation Kinetics of Cardiovascular Implants Employing Full Blood and Extra-Corporeal Circulation Principles: Mimicking the Human Circulation In vitro

Authors: Sara R. Knigge, Sugat R. Tuladhar, Hans-Klaus HöFfler, Tobias Schilling, Tim Kaufeld, Axel Haverich

Abstract:

Tissue engineered (TE) heart valves based on degradable electrospun fiber scaffold represent a promising approach to overcome the known limitations of mechanical or biological prostheses. But the mechanical stress in the high-pressure system of the human circulation is a severe challenge for the delicate materials. Hence, the prediction of the scaffolds` in vivo degradation kinetics must be as accurate as possible to prevent fatal events in future animal or even clinical trials. Therefore, this study investigates whether long-term testing in full blood provides more meaningful results regarding the degradation behavior than conventional tests in simulated body fluids (SBF) or Phosphate Buffered Saline (PBS). Fiber mats were produced from a polycaprolactone (PCL)/tetrafluoroethylene solution by electrospinning. The morphology of the fiber mats was characterized via scanning electron microscopy (SEM). A maximum physiological degradation environment utilizing a test set-up with porcine full blood was established. The set-up consists of a reaction vessel, an oxygenator unit, and a roller pump. The blood parameters (pO2, pCO2, temperature, and pH) were monitored with an online test system. All tests were also carried out in the test circuit with SBF and PBS to compare conventional degradation media with the novel full blood setting. The polymer's degradation is quantified by SEM picture analysis, differential scanning calorimetry (DSC), and Raman spectroscopy. Tensile and cyclic loading tests were performed to evaluate the mechanical integrity of the scaffold. Preliminary results indicate that PCL degraded slower in full blood than in SBF and PBS. The uptake of water is more pronounced in the full blood group. Also, PCL preserved its mechanical integrity longer when degraded in full blood. Protein absorption increased during the degradation process. Red blood cells, platelets, and their aggregates adhered on the PCL. Presumably, the degradation led to a more hydrophilic polymeric surface which promoted the protein adsorption and the blood cell adhesion. Testing degradable implants in full blood allows for developing more reliable scaffold materials in the future. Material tests in small and large animal trials thereby can be focused on testing candidates that have proven to function well in an in-vivo-like setting.

Keywords: Electrospun scaffold, full blood degradation test, long-term polymer degradation, tissue engineered aortic heart valve

Procedia PDF Downloads 126
949 Violence in the School Environment: When the Teenager Encounters the Threat of Depression

Authors: Ndje Ndje Mireille

Abstract:

For some years in Cameroon, there has been an increase in violence in schools. This violence has gone from verbal to physical, sometimes going as far as murder. At the centre of this violence, we find the student who is a teenager in the midst of both physical and psychological changes. The unpredictable transformations of his body, the unexpected emotions arrouse when he encouters someonelse, intrusion, shortcomings, boredom, loneliness and self-deception are the threats to which the teenager faces daily. From the psychopathological point of view, the greatest threat in adolesence is probably the depresive threat. During adolescence and for several resons, the subject is confronted with the self image. He displays certantity which sometimes hides great uncertaintity about what leads him to manifest some particular behaviours or undertake certain actions. Faced with aggressiveness twards those he confronts, he feels more or less guilt. This can lead a certain number of adolescents to feel heplessness faced to their vis-à-vis, faced to life. This helplessness is sometimes reinforced by the social, cultural and economic context in which they are. The teeneger then feels threatens by this depression which, when it reaches its extreme, it is manifested by the feeling that he can no longer do anything. Generally, the depressive threats manifest itself in defensive forms vis-à-vis with the depression itself. Reason why, it is indeed a threat and not a threshold already crossed. This threat often manifests itself in inappropriate forms of attack on one’s own body as seen in a number of repetitive risky behaviours. We also see teenegers confront peers and even adults through physical attacks and often go as far as murder. All these behaviours appears as an absurd way of attacking and at the same time confronting the feeling of remaining alive. This depressive threats can also be expressed in forms of attacks on an individual’s thinking abilities or more explicitely in the form of accademic downfall. The depressive threats does not sum up all the problems of adolescence, but, undoubtly represents currently, one of the deepest form of unease adolescents face.

Keywords: violence, school, depression threats, adolescent, behavior

Procedia PDF Downloads 64
948 Membrane Spanning DNA Origami Nanopores for Protein Translocation

Authors: Genevieve Pugh, Johnathan Burns, Stefan Howorka

Abstract:

Single-molecule sensing via protein nanopores has achieved a step-change in portable and label-free DNA sequencing. However, protein pores of both natural or engineered origin are not able to produce the tunable diameters needed for effective protein sensing. Here, we describe a generic strategy to build synthetic DNA nanopores that are wide enough to accommodate folded protein. The pores are composed of interlinked DNA duplexes and carry lipid anchors to achieve the required membrane insertion. Our demonstrator pore has a contiguous cross-sectional channel area of 50 nm2 which is 6-times larger than the largest protein pore. Consequently, transport of folded protein across bilayers is possible. The modular design is amenable for different pore dimensions and can be adapted for protein sensing or to create molecular gates in synthetic biology.

Keywords: biosensing, DNA nanotechnology, DNA origami, nanopore sensing

Procedia PDF Downloads 297
947 Conspiracy Theories and the Right to Believe

Authors: Zwelenkani Mdlalose

Abstract:

From the moment Covid 19 was declared a pandemic it became clear that conspiracy theories would significantly impact our response to the crisis that the virus was to become. Central to the interest in conspiracy theories evoked by a pandemic is a more general concern for the impact they have on society and social harmony. The specific brand of Conspiracy Theory that is in question is not any and all theories about conspiracies but rather those conspiracy theories which contradict official accounts. For example, where the official account on the terrorist attacks of September 11 2001 is of a conspiracy involving 19 militants associated with the Islamic extremist group al-Qaeda against targets in the United States, the nature of conspiracy theory under study is the one contradicting this official account to the extent that its attributes the attacks not to al-Qaeda militants but to actors in the United States government itself. The study is not an investigation into the truth value of conspiracy theories but rather an attempt at observing the essential qualities of the type of belief that is belief in conspiracy theories compared to belief in official accounts provided by authoritative sources such as governments, experts and mainstream media. These qualities include the psychological, epistemic and socio-political foundations on which belief in conspiracy theories are established. Based on a foundational understanding of the sort of belief that are beliefs in conspiracy theories, we may then extrapolate implied ethical demands on both authoritative bodies and actors as well as believers in conspiracy theories. For example: in their unofficial ‘non-factual’ status, is there not some violation of epistemic right in the same way we observe in cases where people are prejudiced because of their religious beliefs? In other words, is there an epistemic injustice suffered by believers in conspiracy theories in the way their beliefs are rejected as illegitimate? Conversely, to what extent do believers bear an epistemic responsibility in their adoption of their beliefs in conspiracy theories. From this position, perhaps we can then develop responses to the problem that foster greater social harmony even in the midst of suspicion and distrust.

Keywords: conspiracy theories, subjugated knowledge, epistemic injustice, epistemic responsibility

Procedia PDF Downloads 76
946 The Instruction of Imagination: A Theory of Language as a Social Communication Technology

Authors: Daniel Dor

Abstract:

The research presents a new general theory of language as a socially-constructed communication technology, designed by cultural evolution for a very specific function: the instruction of imagination. As opposed to all the other systems of intentional communication, which provide materials for the interlocutors to experience, language allows speakers to instruct their interlocutors in the process of imagining the intended meaning-instead of experiencing it. It is thus the only system that bridges the experiential gaps between speakers. This is the key to its enormous success.

Keywords: experience, general theory of language, imagination, language as technology, social essence of language

Procedia PDF Downloads 558
945 An Approach towards Intelligent Urbanism in New Communities

Authors: Sherine Shafik Aly, Farida Ahmed El Mallah

Abstract:

Technology is a quoted keyword nowadays in all fields; it has been recently thought of and integrated into urban development. This research explains the role of technology in establishing intelligent urbanism to create a convivial and sustainable environment for people to live in. Cities are downgrading socially, economically and environmentally. A framework is to be developed where these three pillars are involved in the planning, design, and spreading of technology to create convivial environments. The aim of this research is achieved by highlighting the importance and approaches of intelligent urbanism, it’s characteristics and principles, then analyzing some relevant examples to achieve a set of guidelines.

Keywords: convivial, intelligent, technology, urban development

Procedia PDF Downloads 227
944 Poly(ε-Caprolactone)-Based Bilayered Scaffolds Prepared by Electrospinning for Tissue Engineering of Small-Diameter Vascular Grafts

Authors: Mohammed Fayez Al Rez

Abstract:

Nowadays, there is an unmet clinical need for new small-diameter vascular grafts to overcome the drawbacks of traditional methods used for treatment of widespread cardiovascular diseases. Vascular tissue engineering (VTE) is a promising approach that can be utilized to develop viable vascular grafts by in vitro seeding of functional cells onto a scaffold allowing them to attach, proliferate and differentiate. To achieve this purpose, the scaffold should provide cells with the initial necessary extracellular matrix environment and structure until being able to reconstruct the required vascular tissue. Therefore, producing scaffolds with suitable features is crucial for guiding cells properly to develop the desired tissue-engineered vascular grafts for clinical applications. The main objective of this work is fabrication and characterization of tubular small-diameter ( < 6 mm) bilayered scaffolds for VTE. The scaffolds were prepared via mixing electrospinning approach of biodegradable poly(ε-caprolactone) (PCL) polymer – due to its favorable physicochemical properties – to mimic the natural environment-extracellular matrix. Firstly, tubular nanofibrous construct with inner diameter of 3, 4 or 5 mm was electrospun as inner layer, and secondly, microfibrous construct was electrospun as outer layer directly on the first produced inner layer. To improve the biological properties of PCL, a group of the electrospun scaffolds was immersed in type-1 collagen solution. The morphology and structure of the resulting fibrous scaffolds were investigated by scanning electron microscope. The electrospun nanofibrous inner layer contained fibers measuring 219±35 nm in diameter, while the electrospun microfibrous outer layer contained fibers measuring 1011 ± 150 nm. Furthermore, mechanical, thermal and physical tests were conducted with both electrospun bilayered scaffold types where revealed improved properties. Biological investigations using endothelial, smooth muscle and fibroblast cell line showed good biocompatibility of both tested electrospun scaffolds. Better attachment and proliferation were obviously found when cells were cultured on the scaffolds immersed with collagen due to increasing the hydrophilicity of the PCL. The easy, inexpensive and versatile electrospinning approach used in this work was able to successfully produce double layered tubular elastic structures containing both nanofibers and microfibers to imitate the native vascular structure. The PCL – as a suitable and approved biomaterial for many biomedical and tissue engineering applications – can ensure favorable mechanical properties of scaffolds used for VTE. The VTE approach using electrospun bilayered scaffolds offers optimal solutions and holds significant promises for treatment of many cardiovascular diseases.

Keywords: electrospinning, poly(ε-caprolactone) (PCL), tissue-engineered vascular graft, tubular bilayered scaffolds, vascular cells

Procedia PDF Downloads 269
943 Deploying a Transformative Learning Model in Technological University Dublin to Assess Transversal Skills

Authors: Sandra Thompson, Paul Dervan

Abstract:

Ireland’s first Technological University (TU Dublin) was established on 1st January 2019, and its creation is an exciting new milestone in Irish Higher Education. TU Dublin is now Ireland’s biggest University supporting 29,000 students across three campuses with 3,500 staff. The University aspires to create work-ready graduates who are socially responsible, open-minded global thinkers who are ambitious to change the world for the better. As graduates, they will be enterprising and daring in all their endeavors, ready to play their part in transforming the future. Feedback from Irish employers and students coupled with evidence from other authoritative sources such as the World Economic Forum points to a need for greater focus on the development of students’ employability skills as they prepare for today’s work environment. Moreover, with an increased focus on Universal Design for Learning (UDL) and inclusiveness, there is recognition that students are more than a numeric grade value. Robust grading systems have been developed to track a student’s performance around discipline knowledge but there is little or no global consensus on a definition of transversal skills nor on a unified framework to assess transversal skills. Education and industry sectors are often assessing one or two skills, and some are developing their own frameworks to capture the learner’s achievement in this area. Technological University Dublin (TU Dublin) have discovered and implemented a framework to allow students to develop, assess and record their transversal skills using transformative learning theory. The model implemented is an adaptation of Student Transformative Learning Record - STLR which originated in the University of Central Oklahoma (UCO). The purpose of this paper therefore, is to examine the views of students, staff and employers in the context of deploying a Transformative Learning model within the University to assess transversal skills. It will examine the initial impact the transformative learning model is having socially, personally and on the University as an organization. Crucially also, to identify lessons learned from the deployment in order to assist other Universities and Higher Education Institutes who may be considering a focused adoption of Transformative Learning to meet the challenge of preparing students for today’s work environment.

Keywords: assessing transversal skills, higher education, transformative learning, students

Procedia PDF Downloads 109
942 A Comprehensive Approach to Create ‘Livable Streets’ in the Mixed Land Use of Urban Neighborhoods Applying Urban Design Principles Which Will Achieve Quality of Life for Pedestrians

Authors: K. C. Tanuja, Mamatha P. Raj

Abstract:

Urbanisation is happening rapidly all over the world. As population increasing in the urban settlements, its required to provide quality of life to all the inhabitants who live in. Urban design is a place making strategic planning. Urban design principles promote visualising any place environmentally, socially and economically viable. Urban design strategies include building mass, transit development, economic viability and sustenance and social aspects.

Keywords: livable streets, social interaction, pedestrian use, urban design

Procedia PDF Downloads 210
941 Investigating the Role of Combined Length Scale Effect on the Mechanical Properties of Ni/Cu Multilayer Structures

Authors: Naresh Radaliyagoda, Nigel M. Jennett, Rong Lan, David Parfitt

Abstract:

A series of length scale engineered multilayer material with temperature robust mechanical properties has been suggested. A range of polycrystalline copper sub-layers with the thickness varying from 1 to 25μm and buried in between two nickel layers was produced using electrodeposition dual bath technique. The structure of the multilayers was characterized using Electron Backscatter Diffraction and Scanning Electron Microscope. The interface effect on the hardness and elastic modulus was tested using Nano-indentation. Results of the grain size and layer thickness measurements, and indentation hardness have been compared. It is found that there is a combined length scale effect that improves mechanical properties in Ni/Cu multilayer structures.

Keywords: nano-indentation, size effect, multilayers, electrodeposition

Procedia PDF Downloads 126
940 A Goal-Oriented Social Business Process Management Framework

Authors: Mohammad Ehson Rangiha, Bill Karakostas

Abstract:

Social Business Process Management (SBPM) promises to overcome limitations of traditional BPM by allowing flexible process design and enactment through the involvement of users from a social community. This paper proposes a meta-model and architecture for socially driven business process management systems. It discusses the main facets of the architecture such as goal-based role assignment that combines social recommendations with user profile, and process recommendation, through a real example of a charity organization.

Keywords: business process management, goal-based modelling, process recommendation social collaboration, social BPM

Procedia PDF Downloads 469
939 Belonging in South Africa: Networks among African Immigrants and South African Natives

Authors: Efe Mary Isike

Abstract:

The variety of relationships between migrants and host communities is an enduring theme of migration studies. On one extreme, there are numerous examples of hostility towards ‘strangers’ who are either ejected from society or denied access to jobs, housing, education, healthcare and other aspects of normal life. More moderate treatments of those identified as different include expectations of assimilation in which host communities expect socially marginalized groups to conform to norms that they define. Both exclusion and assimilation attempt to manage the problem of difference by removing it. South Africa experienced great influx of African immigrants who worked in mines and farms under harsh and exploitative conditions before and after the institutionalization of apartheid. Although these labour migrants contributed a great deal to the economic development of South Africa, they were not given citizenship status. The formal democratization in 1994 came with dreams and expectations of a more inclusive South Africa, where black South Africans hoped to maximize their potential in a more free, fair and equal society. In the same vein, it also opened spaces for an influx of especially African immigrants into the country which set the stage for a new form of contest for belonging between South African citizens and African migrant settlers. One major manifestation of this contest was the violent xenophobic attacks against African immigrants which predate that of May 2008 and has continued with lower intensity across the country since then. While it is doubtless possible to find abundant evidence of antagonism in the relations between South Africans and African immigrants, the purpose of this study is to investigate the everyday realities of migrants in ordinary places who interact with a variety of people through their livelihood activities, marriages and social relationships, moving around towns and cities, in their residential areas, in faith-based organizations and other elements of everyday life. Rather than assuming all relations are hostile, this study intends to look at the breadth of everyday relationships within a specific context. Based on the foregoing, the main task of this study is to holistically examine and explain the nature of interactions between African migrants and South African citizens by analysing the social network ties that connect them in the specific case of Umhlathuze municipality. It will also investigate the variety of networks that exists between African migrants and South Africans and examine the nature of the linkages in the various networks identified between these two groups in Umhlathuze Municipality. Apart from a review of relevant literature, policies and other official documents, this paper will employ a purposive sample survey and in-depth interview of African immigrants and South Africans within their networks in selected suburbs in KwaZulu-Natal.

Keywords: migration, networks, development, host communities

Procedia PDF Downloads 257
938 RNA Interference Technology as a Veritable Tool for Crop Improvement and Breeding for Biotic Stress Resistance

Authors: M. Yusuf

Abstract:

The recent discovery of the phenomenon of RNA interference has led to its application in various aspects of plant improvement. Crops can be modified by engineering novel RNA interference pathways that create small RNA molecules to alter gene expression in crops or plant pests. RNA interference can generate new crop quality traits or provide protection against insects, nematodes and pathogens without introducing new proteins into food and feed products. This is an advantage in contrast with conventional procedures of gene transfer. RNA interference has been used to develop crop varieties resistant to diseases, pathogens and insects. Male sterility has been engineered in plants using RNA interference. Better quality crops have been developed through the application of RNA interference etc. The objective of this paper is to highlight the application of RNA interference in crop improvement and to project its potential future use to solve problems of agricultural production in relation to plant breeding.

Keywords: RNA interference, application, crop Improvement, agricultural production

Procedia PDF Downloads 398