Search results for: cyber defence
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 433

Search results for: cyber defence

103 Theoretical Approach and Proof of Concept Implementation of Adaptive Partition Scheduling Module for Linux

Authors: Desislav Andreev, Veselin Stanev

Abstract:

Linux operating system continues to gain popularity with every passed year. This is due to its open-source license and a great number of distributions, covering users’ needs. At first glance it seems that Linux can be integrated in every type of systems – it is already present in personal computers, smartphones and even in some embedded systems like Raspberry Pi. However, Linux still does not meet the performance and security requirements to run effectively on a real-time system. Real-time systems are very time-restricted – their processes have to execute and finish at strict time intervals. The Completely Fair Scheduler present in Linux does not have such scheduling capabilities and it is not able to ensure that critical-time processes will execute on time. One of the ways to solve this problem is implementing an Adaptive Partition Scheduler solution similar to that present in QNX Neutrino operating system. This type of scheduling divides the CPU in multiple adaptive partitions where each partition holds a percentage of CPU usage called budget, which allows optimal usage of the CPU resources and also provides protection against cyber attacks such as Denial of Service. This approach will also benefit systems, where functional safety is highly demanded, such as the instrumental clusters in the Automotive industry. The purpose of this paper is to present a concept of Adaptive Partition Scheduler designed for Linux-based operating systems.

Keywords: adaptive partitions, Linux kernel modules, real-time systems, scheduling

Procedia PDF Downloads 87
102 A Comparison of Sulfur Mustard Cytotoxic Effects on the Two Human Lung Origin Cell Lines

Authors: P. Jost, L. Muckova, M. Matula, J. Pejchal, D. Jun, R. Stetina

Abstract:

Sulfur mustard (bis(2-chlorethyl) sulfide) is highly toxic, chemical warfare agent that has been used in the past in several armed conflicts. Except for the skin, respiratory tract is one of the important routes of exposure. The elucidation and understanding of the mechanism of toxicity of SM have been effort intensive research. The multiple targets character of SM caused cellular damage resulted in activation of many different mechanisms which contribute to cellular response and participate in the final cytopathology effect. In our present work, we compared time-dependent changes in sulfur mustard exposed adult human lung fibroblasts NHLF and lung epithelial alveolar cell line A-549. Cell viability (MTT assay, Calcein-AM assay, and xCELLigence - real-time cell analysis), apoptosis (flow cytometry), mitochondrial membrane potential (Δψm, flow cytometry), reactive oxygen species induction (DC and cell cycle distribution (flow cytometry) were studied. We observed significantly decreased mitochondrial membrane potential and subsequent induction of apoptosis correlating with decreased cellular viability in the sulfur mustard exposed cells. In low concentrations, sulfur mustard-induced S-phase cell cycle arrest, on the other hand, high concentrations, cell cycle phase distribution of sulfur mustard exposed cells resembled cell cycle phase distribution of control group, which implies nonspecific cell cycle inhibition. Epithelial cells A-549 was found as more sensible to sulfur mustard toxicity. Acknowledgements: This work was supported by a long-term organization development plan Medical Aspects of Weapons of Mass Destruction of the Faculty of Military Health Sciences, University of Defence.

Keywords: apoptosis, cell cycle, cytotoxicity, sulfur mustard

Procedia PDF Downloads 177
101 Design of an Ensemble Learning Behavior Anomaly Detection Framework

Authors: Abdoulaye Diop, Nahid Emad, Thierry Winter, Mohamed Hilia

Abstract:

Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy.

Keywords: cybersecurity, data protection, access control, insider threat, user behavior analysis, ensemble learning, high performance computing

Procedia PDF Downloads 111
100 The Impact of Cybercrime on Youth Development in Nigeria

Authors: Christiana Ebobo

Abstract:

Cybercrime consists of numerous crimes that are perpetrated on the internet on daily basis. The forms include but not limited to Identity theft, Pretentious dating, Desktop counterfeiting, Internet chat room, Cyber harassment, Fraudulent electronic mails, Automated Teller Machine Spoofing, Pornography, Piracy, Hacking, Credit card frauds, Phishing and Spamming. The general term used among the youths for this type of crime in Nigeria is ‘Yahoo Yahoo’. Cybercrime is on the increase among the youths at all levels as such this study aims at examining the impact of cybercrime on youth development in Nigeria. The study examines the impact of cybercrime on youths’ academic performance, integrity, employment and religious practices. The study is a survey which made use of questionnaire and focus group discussion among 150 randomly selected youths in Gwagwalada LCDA, Federal Capital Territory, Nigeria. The study adopts the systems theory as its theoretical framework. The study also adopts the simple frequency table and percentage for its data analysis. The study reveals that cybercrime has eaten deep into the minds of some youths and some of them are practicing diabolic means to succeed in it. It is also reveals that majority (68%) of the respondents believe that cybercrime impacts negatively on youths’ academic performance in Nigeria. The major recommendation of this study is that cybercrime offenders should be treated like armed robbers in order to discourage other youths from getting involved in it.

Keywords: armed robber, cybercrime, integrity, youth

Procedia PDF Downloads 504
99 Demonstration Operation of Distributed Power Generation System Based on Carbonized Biomass Gasification

Authors: Kunio Yoshikawa, Ding Lu

Abstract:

Small-scale, distributed and low-cost biomass power generation technologies are highly required in the modern society. There are big needs for these technologies in the disaster areas of developed countries and un-electrified rural areas of developing countries. This work aims to present a technical feasibility of the portable ultra-small power generation system based on the gasification of carbonized wood pellets/briquettes. Our project is designed for enabling independent energy production from various kinds of biomass resources in the open-field. The whole process mainly consists of two processes: biomass and waste pretreatment; gasification and power generation. The first process includes carbonization, densification (briquetting or pelletization), and the second includes updraft fixed bed gasification of carbonized pellets/briquettes, syngas purification, and power generation employing an internal combustion gas engine. A combined pretreatment processes including carbonization without external energy and densification were adopted to deal with various biomass. Carbonized pellets showed a better gasification performance than carbonized briquettes and their mixture. The 100-hour continuous operation results indicated that pelletization/briquetting of carbonized fuel realized the stable operation of an updraft gasifier if there were no blocking issues caused by the accumulation of tar. The cold gas efficiency and the carbon conversion during carbonized wood pellets gasification was about 49.2% and 70.5% with the air equivalence ratio value of around 0.32, and the corresponding overall efficiency of the gas engine was 20.3% during the stable stage. Moreover, the maximum output power was 21 kW at the air flow rate of 40 Nm³·h⁻¹. Therefore, the comprehensive system covering biomass carbonization, densification, gasification, syngas purification, and engine system is feasible for portable, ultra-small power generation. This work has been supported by Innovative Science and Technology Initiative for Security (Ministry of Defence, Japan).

Keywords: biomass carbonization, densification, distributed power generation, gasification

Procedia PDF Downloads 148
98 Off-Policy Q-learning Technique for Intrusion Response in Network Security

Authors: Zheni S. Stefanova, Kandethody M. Ramachandran

Abstract:

With the increasing dependency on our computer devices, we face the necessity of adequate, efficient and effective mechanisms, for protecting our network. There are two main problems that Intrusion Detection Systems (IDS) attempt to solve. 1) To detect the attack, by analyzing the incoming traffic and inspect the network (intrusion detection). 2) To produce a prompt response when the attack occurs (intrusion prevention). It is critical creating an Intrusion detection model that will detect a breach in the system on time and also challenging making it provide an automatic and with an acceptable delay response at every single stage of the monitoring process. We cannot afford to adopt security measures with a high exploiting computational power, and we are not able to accept a mechanism that will react with a delay. In this paper, we will propose an intrusion response mechanism that is based on artificial intelligence, and more precisely, reinforcement learning techniques (RLT). The RLT will help us to create a decision agent, who will control the process of interacting with the undetermined environment. The goal is to find an optimal policy, which will represent the intrusion response, therefore, to solve the Reinforcement learning problem, using a Q-learning approach. Our agent will produce an optimal immediate response, in the process of evaluating the network traffic.This Q-learning approach will establish the balance between exploration and exploitation and provide a unique, self-learning and strategic artificial intelligence response mechanism for IDS.

Keywords: cyber security, intrusion prevention, optimal policy, Q-learning

Procedia PDF Downloads 225
97 Mental Illness on Youtube: Exploring Identity Performance in the Virtual Space

Authors: P. Saee, Baiju Gopal

Abstract:

YouTube has seen a surge in the recent years in the number of creators opening up about their mental illness on the video-sharing platform. In documenting their mental health, YouTubers perform an identity of their mental illness in the online world. Identity performance is a theory under identity research that has been readily applied to illness narratives and internet studies. Furthermore, in India, suffering from mental illnesses is regarded with stigma, making the act of taking mental health from a personal to a public space on YouTube a phenomenon worth exploring. Thus, the aim of this paper is to analyse the mental illness narratives of Indian YouTubers for understanding its performance in the virtual world. For this purpose, thematic narrative analysis on the interviews of four Indian YouTubers was conducted. This data was synthesized with analysis of the videos the YouTubers had uploaded on their channel sharing about their mental illness. The narratives of the participants shed light on two significant presentations that they engage in: (a) the identity of a survivor/fighter and (b) the identity of a silent sufferer. Further, the participants used metaphors to describe their illness, thereby co-constructing a corresponding identity based on their particular metaphors. Lastly, the process of bringing mental illness from back stage to front stage on YouTube involves a shift in the audience, from being rejecting and invalidating in real life to being supportive and encouraging in the virtual space. Limitations and implications for future research were outlined.

Keywords: cyber-psychology, internet, media, mental health, mental illness, technology

Procedia PDF Downloads 163
96 Media Diplomacy in the Age of Social Networks towards a Conceptual Framework for Understanding Diplomatic Cyber Engagement

Authors: Mohamamd Ayish

Abstract:

This study addresses media diplomacy as an integral component of public diplomacy which emerged in the United States in the post-World War II era and found applications in other countries around the world. The study seeks to evolve a conceptual framework for understanding the practice of public diplomacy through social networks, often referred to as social engagement diplomacy. This form of diplomacy is considered far more ahead of the other two forms associated with both government controlled and independent media. The cases of the Voice of America Arabic Service and the 1977 CBS interviews with the late Egyptian President Anwar Sadat and Israeli Prime Minister Menachem Begin are cited in this study as reflecting the two traditional models. The new social engagement model sees public diplomacy as an act of communication that seeks to effect changes in target audiences through a process of persuasion shaped by discourse orientations and technological features. The proposed conceptual framework for social, diplomatic engagement draws on an open communication environment, an empowered audience, an interactive and symmetrical process of communication, multimedia-based flows of information, direct and credible feedback, distortion and high risk. The writer believes this study would be helpful in providing appropriate knowledge pertaining to our understanding of social diplomacy and furnishing concrete insights into how diplomats could harness virtual space to maximize their goals in the global environment.

Keywords: diplomacy, engagement, social, globalization

Procedia PDF Downloads 263
95 Disaster and Crisis Management Using Geographical Information System (GIS) during the Operation and Maintenance Stages of the Hyderabad Metro Rail in India

Authors: Sai Rajeev Reddy, Ishita Roy, M. Anji Reddy

Abstract:

The paper describes the importance of preventive measures and immediate Emergency logistics during accidents and unfortunate Disasters for the Hyderabad Metro Rails in their various stages of construction. This is the need of the modern generation where accidents, explosions, attacks and sudden crisis are frequent casualties which take huge tolls of life in the present world. The paper utilizes the workflow and application of Geographical information System (GIS) to provide information about problems and crisis structures for efficient Metro Transportation in the city. The study analyzes the difficulties and problems which cause accidents during operation and maintenance stages of the Metro Rail. The paper focuses upon the intermediate and firsthand information of Crisis with the help of GIS technology to share Disaster data for effective measures by the Cyber Police stations, Emergency Responders, Hospitals and First Aid Centre to act immediately and save lives. The results and conclusions have nevertheless proved very informative and useful for the safety board authorities of the Hyderabad Metro Rail. The operation and Maintenance are integral stages in the development of any Multipurpose transportation Projects and are usually prone to various Disasters and tragedies. Hence, the GIS technologies help in distribution of information among the masses with the web Technologies and advanced software developed to prevent and manage crisis widely and in a cost-benefits manner.

Keywords: Geographical Information System, emergency assessment, accident zones, surveillance

Procedia PDF Downloads 554
94 The Rise of Darknet: A Call for Understanding Online Communication of Terrorist Groups in Indonesia

Authors: Aulia Dwi Nastiti

Abstract:

A number of studies and reports on terrorism have continuously addressed the role of internet and online activism to support terrorist and extremist groups. In particular, they stress on social media’s usage that generally serves for the terrorist’s propaganda as well as justification of their causes. While those analyses are important to understand how social media is a vital tool for global network terrorism, they are inadequate to explain the online communication patterns that enable terrorism acts. Beyond apparent online narratives, there is a deep cyber sphere where the very vein of terrorism movement lies. That is a hidden space in the internet called ‘darknet’. Recent investigations, particularly in Middle Eastern context, have shed some lights that this invisible space in the internet is fundamental to maintain the terrorist activities. Despite that, limited number of research examines darknet within the issue of terrorist movements in Indonesian context—where the country is considered quite a hotbed for extremist groups. Therefore, this paper attempts to provide an insight of darknet operation in Indonesian cases. By exploring how the darknet is used by the Indonesian-based extremist groups, this paper maps out communication patterns of terrorist groups on the internet which appear as an intermingled network. It shows the usage of internet is differentiated in different level of anonymity for distinctive purposes. This paper further argues that the emerging terrorist communication network calls for a more comprehensive counterterrorism strategy on the Internet.

Keywords: communication pattern, counterterrorism, darknet, extremist groups, terrorism

Procedia PDF Downloads 280
93 Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison between Central Processing Unit vs. Graphics Processing Unit Functions for Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar

Abstract:

Neural network approaches are machine learning methods used in many domains, such as healthcare and cyber security. Neural networks are mostly known for dealing with image datasets. While training with the images, several fundamental mathematical operations are carried out in the Neural Network. The operation includes a number of algebraic and mathematical functions, including derivative, convolution, and matrix inversion and transposition. Such operations require higher processing power than is typically needed for computer usage. Central Processing Unit (CPU) is not appropriate for a large image size of the dataset as it is built with serial processing. While Graphics Processing Unit (GPU) has parallel processing capabilities and, therefore, has higher speed. This paper uses advanced Neural Network techniques such as VGG16, Resnet50, Densenet, Inceptionv3, Xception, Mobilenet, XGBOOST-VGG16, and our proposed models to compare CPU and GPU resources. A system for classifying autism disease using face images of an autistic and non-autistic child was used to compare performance during testing. We used evaluation matrices such as Accuracy, F1 score, Precision, Recall, and Execution time. It has been observed that GPU runs faster than the CPU in all tests performed. Moreover, the performance of the Neural Network models in terms of accuracy increases on GPU compared to CPU.

Keywords: autism disease, neural network, CPU, GPU, transfer learning

Procedia PDF Downloads 99
92 Factors Influencing Accidental Cyberbullying on Social Media: Healthcare Industry Perspective

Authors: Iram Malik, Mahrukh Shaukat, Abeer Malik, Hafiz Mushtaq Ahmad

Abstract:

There has been a lot of research on cyberbullying but there is limited research on the topic of accidental cyberbullying on social media with a special focus on healthcare industry. This study emphasizes to uncover the factors that contribute to accidental cyberbullying on social media and how it affects individuals, professionals’ and organizations in health care sector. Nowadays social media is becoming a necessary part of our daily life; there is a need to look into how it is shaping our social life and behaviors displayed online. Instances of cyber bullying can have long-term repercussions due to over-sharing of information. The study used simple random sampling and the instrument of data collection was survey. A sample size of 250 healthcare professionals was chosen from the twin cities of Rawalpindi and Islamabad, Pakistan to examine the relationship between their attitude towards internet use, psychological distress, verbal aggression, envy, frustration, self-compassion, personality traits and accidental cyberbullying on social media. The results of the study have been encouraging. The findings show that psychological distress, aggression, envy, frustration and personality traits had direct effect on accidental cyberbullying whereas compassion, altruism lessened the effect of accidental cyberbullying behavior. It is our intent that the findings of this study could help raise awareness regarding fair use of social media, help policy makers in developing appropriate policies for avoiding cyberbullying in future.

Keywords: accidental cyberbullying, aggression, cyberbullying, frustration, social media

Procedia PDF Downloads 275
91 Aggression, Satisfaction and Online Rant Engagement of College Students in General Santos City

Authors: Amanda Andrea Beatrix Brita, Dominic J. Buenaventura, Charmaine A. Seromines, Antonne Noel V. Chua, Ma. Luisa G. Badilles

Abstract:

Online ranting, or the act of forcefully expressing your opinion towards other people over the Internet, has been an ongoing issue ever since the creation of the Internet. Due to the COVID-19 pandemic, the rise of active users has been observed to have increased during this time, thus increasing the number of people being engaged in online activities, which consequently affects the number of individuals who participate in online ranting. However, with all that is observed, what is usually not a topic being discussed about this event are the motivations that lead people to do online ranting. The study was undertaken to discover the level of aggression, Satisfaction, and online engagement in their environment. We utilized 2 researcher-made questionnaires that were validated by three experts, namely for the Satisfaction and engagement levels. We adapted Cyber-Aggression Typology Questionnaire (CATQ) for the level of aggression. Quota sampling was used in determining the respondents. A quota of 250 students was recommended. The results showed that the students in every institution have a deficient level of aggression, and the majority of the institution has a shallow level of Satisfaction when it comes to online ranting. Similar findings are presented in the level of engagement; 2 out of 3 of the institution students have shallow engagement in the general settings that expound students' engagement. Although the result shows deficient levels, there are still instances and possibilities that students may still engage in an online rant regarding various circumstances when triggered. Researchers assumed that there are restrictions on movements likely to show opinions online because of consequences.

Keywords: aggression, satisfaction, online rant engagement, online rant

Procedia PDF Downloads 67
90 Criteria for Good Governance in Georgian Defense Sector:Standards and Principles

Authors: Vephkhvia Grigalashvili

Abstract:

This paper provides an overview of criteria for good governance in Georgian defense sector and scientific outcomes of comparative research. A respect for good governance and its realization into Georgian national defense sector represents a fundamental institutional necessity as well as country`s politico-legal obligation within the framework of the existing collaboration mechanisms with NATO (especially Building Integrity (BI) Programme) and the Association Agreement between the EU and Georgia. Furthermore good governance is considered as a democracy measuring criterion in country`s Euro-Atlantic integration process. Accordingly, integration and further development of the contemporary approaches of good governance into Georgian defense management model represents a burning issue of the country. The assessment of an existing model of the country, identification of defects and determination of course of institutional reforms in a mutual comparison format of good governance mechanisms of NATO or/and the EU member Eastern European or Baltic countries positively assessed by the international organizations is considered as a precondition for its effective realization. Scientific aims of this study are: (a) to conduct comparative analysis of Georgian national principles and generalized standards of NATO or/and the EU member Eastern European and Baltic countries in following segments of good governance: open governance; anticorruption policy; conflict of interests; integrity; internal and external control bodies; (b) to formulate theoretical and practical recommendations on reforms to be implemented in the country`s national defence sector. As research reveals, although, institutional / legal pillars of good governance in Georgian defense sector generally are in compliance with international principles, the quality of implementation of good government norms still remains as an area that needs further development by raising awareness of public servants and community.

Keywords: anti-corruption policy within Georgian defense governance, conflict of interests within Georgian defense governance, good governance in Georgian defense sector, principles of integrity in Georgian defense management

Procedia PDF Downloads 153
89 Using Autoencoder as Feature Extractor for Malware Detection

Authors: Umm-E-Hani, Faiza Babar, Hanif Durad

Abstract:

Malware-detecting approaches suffer many limitations, due to which all anti-malware solutions have failed to be reliable enough for detecting zero-day malware. Signature-based solutions depend upon the signatures that can be generated only when malware surfaces at least once in the cyber world. Another approach that works by detecting the anomalies caused in the environment can easily be defeated by diligently and intelligently written malware. Solutions that have been trained to observe the behavior for detecting malicious files have failed to cater to the malware capable of detecting the sandboxed or protected environment. Machine learning and deep learning-based approaches greatly suffer in training their models with either an imbalanced dataset or an inadequate number of samples. AI-based anti-malware solutions that have been trained with enough samples targeted a selected feature vector, thus ignoring the input of leftover features in the maliciousness of malware just to cope with the lack of underlying hardware processing power. Our research focuses on producing an anti-malware solution for detecting malicious PE files by circumventing the earlier-mentioned shortcomings. Our proposed framework, which is based on automated feature engineering through autoencoders, trains the model over a fairly large dataset. It focuses on the visual patterns of malware samples to automatically extract the meaningful part of the visual pattern. Our experiment has successfully produced a state-of-the-art accuracy of 99.54 % over test data.

Keywords: malware, auto encoders, automated feature engineering, classification

Procedia PDF Downloads 61
88 BFDD-S: Big Data Framework to Detect and Mitigate DDoS Attack in SDN Network

Authors: Amirreza Fazely Hamedani, Muzzamil Aziz, Philipp Wieder, Ramin Yahyapour

Abstract:

Software-defined networking in recent years came into the sight of so many network designers as a successor to the traditional networking. Unlike traditional networks where control and data planes engage together within a single device in the network infrastructure such as switches and routers, the two planes are kept separated in software-defined networks (SDNs). All critical decisions about packet routing are made on the network controller, and the data level devices forward the packets based on these decisions. This type of network is vulnerable to DDoS attacks, degrading the overall functioning and performance of the network by continuously injecting the fake flows into it. This increases substantial burden on the controller side, and the result ultimately leads to the inaccessibility of the controller and the lack of network service to the legitimate users. Thus, the protection of this novel network architecture against denial of service attacks is essential. In the world of cybersecurity, attacks and new threats emerge every day. It is essential to have tools capable of managing and analyzing all this new information to detect possible attacks in real-time. These tools should provide a comprehensive solution to automatically detect, predict and prevent abnormalities in the network. Big data encompasses a wide range of studies, but it mainly refers to the massive amounts of structured and unstructured data that organizations deal with on a regular basis. On the other hand, it regards not only the volume of the data; but also that how data-driven information can be used to enhance decision-making processes, security, and the overall efficiency of a business. This paper presents an intelligent big data framework as a solution to handle illegitimate traffic burden on the SDN network created by the numerous DDoS attacks. The framework entails an efficient defence and monitoring mechanism against DDoS attacks by employing the state of the art machine learning techniques.

Keywords: apache spark, apache kafka, big data, DDoS attack, machine learning, SDN network

Procedia PDF Downloads 159
87 Binge Eating among Women Who Suffer from Psychological Abuse in Their Relationship: The Moderating Role of Defense Mechanisms

Authors: Orly Yona Drori, Shirley Ben Shlomo

Abstract:

Objectives: The participants will be able to recognize the predictors of binge eating addiction among women who suffer from psychological abuse in their relationships and will recognize the role of woman's defense mechanisms in moderating the association between psychological abuse and binge eating addiction. Methods: A convenience sample of 380 Israeli women in relationships were located via the Internet, and after consenting to participate in the study, they completed a series of structured questionnaires (The Yale Food Addiction Scale; The Defense Style Questionnaire; psychological maltreatment of women by their male partners; level of differentiation of self; sociodemographic questionnaire). Results: The higher the level of differentiation and mature defense mechanisms, the less addictive a woman is. However, the level of addiction among women who experience psychological abuse within their intimate relations is higher than women who do not experience psychological abuse in their relationship. Among women who experienced psychological abuse in their relations, the defense mechanisms moderate the association between psychological abuse within intimate relations and the extent of the addiction to binge eating. Conclusions: The study contributes to the therapy of women with binge eating addictions, as it raises awareness of therapeutic-related content that could strengthen women and help them to cope with situations in their lives without the need to binge. One of the significant variables for therapeutic work is the level of differentiation of the self. In addition, identifying the types of defense mechanisms might help to match treatment to the woman's emotional needs. The current study found also that it is important to identify the environmental systems by which the addict is surrounded, such as whether woman is in an abusive relationship. Finally the study leads to the recognition that binge eating, which is usually treated with an emphasis on nutritional behavior change, is an addiction, and as such, it requires a combination of mental, nutritional and behavioral therapy. In view of this approach, it is recommended that treating a woman who is addicted to binge eating should involve a multi-disciplinary team comprised of physicians, clinical dietitians, and clinical psychotherapists.

Keywords: binge eating, defence mechanism, food addiction, psychological abuse

Procedia PDF Downloads 158
86 Development of an Intelligent Decision Support System for Smart Viticulture

Authors: C. M. Balaceanu, G. Suciu, C. S. Bosoc, O. Orza, C. Fernandez, Z. Viniczay

Abstract:

The Internet of Things (IoT) represents the best option for smart vineyard applications, even if it is necessary to integrate the technologies required for the development. This article is based on the research and the results obtained in the DISAVIT project. For Smart Agriculture, the project aims to provide a trustworthy, intelligent, integrated vineyard management solution that is based on the IoT. To have interoperability through the use of a multiprotocol technology (being the future connected wireless IoT) it is necessary to adopt an agnostic approach, providing a reliable environment to address cyber security, IoT-based threats and traceability through blockchain-based design, but also creating a concept for long-term implementations (modular, scalable). The ones described above represent the main innovative technical aspects of this project. The DISAVIT project studies and promotes the incorporation of better management tools based on objective data-based decisions, which are necessary for agriculture adapted and more resistant to climate change. It also exploits the opportunities generated by the digital services market for smart agriculture management stakeholders. The project's final result aims to improve decision-making, performance, and viticulturally infrastructure and increase real-time data accuracy and interoperability. Innovative aspects such as end-to-end solutions, adaptability, scalability, security and traceability, place our product in a favorable situation over competitors. None of the solutions in the market meet every one of these requirements by a unique product being innovative.

Keywords: blockchain, IoT, smart agriculture, vineyard

Procedia PDF Downloads 184
85 Local Differential Privacy-Based Data-Sharing Scheme for Smart Utilities

Authors: Veniamin Boiarkin, Bruno Bogaz Zarpelão, Muttukrishnan Rajarajan

Abstract:

The manufacturing sector is a vital component of most economies, which leads to a large number of cyberattacks on organisations, whereas disruption in operation may lead to significant economic consequences. Adversaries aim to disrupt the production processes of manufacturing companies, gain financial advantages, and steal intellectual property by getting unauthorised access to sensitive data. Access to sensitive data helps organisations to enhance the production and management processes. However, the majority of the existing data-sharing mechanisms are either susceptible to different cyber attacks or heavy in terms of computation overhead. In this paper, a privacy-preserving data-sharing scheme for smart utilities is proposed. First, a customer’s privacy adjustment mechanism is proposed to make sure that end-users have control over their privacy, which is required by the latest government regulations, such as the General Data Protection Regulation. Secondly, a local differential privacy-based mechanism is proposed to ensure the privacy of the end-users by hiding real data based on the end-user preferences. The proposed scheme may be applied to different industrial control systems, whereas in this study, it is validated for energy utility use cases consisting of smart, intelligent devices. The results show that the proposed scheme may guarantee the required level of privacy with an expected relative error in utility.

Keywords: data-sharing, local differential privacy, manufacturing, privacy-preserving mechanism, smart utility

Procedia PDF Downloads 62
84 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 84
83 Elucidating the Defensive Role of Silicon-Induced Biochemical Responses in Wheat Exposed to Drought and Diuraphis noxia Infestation

Authors: Lintle Mohase, Ninikoe Lebusa, Mpho Stephen Mafa

Abstract:

Wheat is an economically important cereal crop. However, the changing climatic conditions that intensify drought in production areas, and additional pest infestation, such as the Russian wheat aphid (RWA, Diuraphis noxia), severely hamper its production. Drought and pest management require an additional water supply through irrigation and applying inorganic nutrients (including silicon) as alternative strategies to mitigate the stress effects. Therefore, other approaches are needed to enhance wheat productivity during drought stress and aphid abundance. Two wheat cultivars were raised under greenhouse conditions, exposed to drought stress, and treated with silicon before infestation with the South African RWA biotype 2 (RWASA2). The morphological evaluations showed that severe drought or a combination of drought and infestation significantly reduced the plant height of wheat cultivars. Silicon treatment did not alleviate the growth reduction. The biochemical responses were measured using spectrophotometric assays with specific substrates. An evaluation of the enzyme activities associated with oxidative stress and defence responses indicated that drought stress increased NADPH oxidase activity, while silicon treatment significantly reduced it in drought-stressed and infested plants. At 48 and 72 hours sampling periods, a combination of silicon, drought and infestation treatment significantly increased peroxidase activity compared to drought and infestation treatment. The treatment also increased β-1,3-glucanase activity 72 hours after infestation. In addition, silicon and drought treatment increased glucose but reduced sucrose accumulation. Furthermore, silicon, drought, and infestation treatment combinations reduced the sucrose content. Finally, silicon significantly increased the trehalose content under severe drought and infestation, evident at 48 and 72-hour sampling periods. Our findings shed light on silicon’s ability to induce protective biochemical responses during drought and aphid infestation.

Keywords: drought, enzyme activity, silicon, soluble sugars, Russian wheat aphid, wheat

Procedia PDF Downloads 65
82 The Molecular Analysis of Effect of Phytohormones and Spermidine on Tomato Growth under Biotic Stress

Authors: Rumana Keyani, Haleema Sadia, Asia Nosheen, Rabia Naz, Humaira Yasmin, Sidra Zahoor

Abstract:

Tomato is a significant crop of the world and is one of the staple foods of Pakistan. A vast number of plant pathogens from simple viruses to complex parasites cause diseases in tomatoes but fungal infection in our country is quite high. Sometimes the symptoms are too harsh destroying the crop altogether. Countries like our own with continuously increasing massive population and limited resources cannot afford such an economic loss. There is an array of morphological, genetic, biochemical and molecular processes involved in plant resistance mechanisms to biotic stress. The study of different metabolic pathways like Jasmonic acid (JA) pathways and most importantly signaling molecules like ROS/RNS and their redoxin enzymes i.e. TRX and NRX is crucial to disease management, contributing to healthy plant growth. So, improving tolerance in crop plants against biotic stresses is a dire need of our country and world as whole. In the current study, fungal pathogenic strains Alternaria solani and Rhizoctonia solani were used to inoculate tomatoes to check the defense responses of tomato plant against these pathogens at molecular as well as phenotypic level with jasmonic acid and spermidine pretreatment. All the growth parameters (root and shoot length, dry and weight root, shoot weight measured 7 days post-inoculation, exhibited that infection drastically declined the growth of the plant whereas jasmonic acid and spermidine assisted the plants to cope up with the infection. Thus, JA and Spermidine treatments maintained comparatively better growth factors. Antioxidant assays and expression analysis through real time quantitative PCR following time course experiment at 24, 48 and 72 hours intervals also exhibited that activation of JA defense genes and a polyamine Spermidine helps in mediating tomato responses against fungal infection when used alone but the two treatments combined mask the effect of each other.

Keywords: fungal infection, jasmonic acid defence, tomato, spermidine

Procedia PDF Downloads 111
81 Niche Authorities and Social Activism: Interrogating the Activities of Selected Bloggers in Ghana

Authors: Akosua Asantewaa Anane

Abstract:

Social media and its networking sites have become beneficial to society. With the advent of Web 2.0, many people are becoming technologically savvy and attracted to internet-based activities. With the click of a button, users are now sharing more information on topics, events and issues than before. A new phenomenon in the Ghanaian journalism sphere is the advent of blogger and citizen journalism, some of whom have become niche authorities. Niche authorities have emerged through the habitual and persistent curation of news on specific topics, resulting in the steady growth and emergence of valuable contributions to news sharing. Minimal studies have been conducted on niche authorities and their role in social activism in Ghana. This study, anchored on Cialdini’s Six Principles of Persuasion (reciprocation, consistency, social proof, liking, authority and scarcity), explores the features of niche authorities, their areas of expertise, as well as their authoritative voices in the curation of news stories. Using qualitative content analysis, cyber ethnography and thematic analysis of purposively sampled social media posts of five niche authorities, the study interrogates how these niche authorities employ the six principles of persuasion on their platforms to spark conversations on development, social inclusion and gender-based issues in the country. The study discusses how niche authorities deploy the principles in social activism and further recommends nurturing and mentoring communication strategies to progressively guide the youth to become future niche authorities in news curation and news sharing.

Keywords: social activism, cialdini’s six principles of persuasion, news curation, niche authorities

Procedia PDF Downloads 53
80 Composite Approach to Extremism and Terrorism Web Content Classification

Authors: Kolade Olawande Owoeye, George Weir

Abstract:

Terrorism and extremism activities on the internet are becoming the most significant threats to national security because of their potential dangers. In response to this challenge, law enforcement and security authorities are actively implementing comprehensive measures by countering the use of the internet for terrorism. To achieve the measures, there is need for intelligence gathering via the internet. This includes real-time monitoring of potential websites that are used for recruitment and information dissemination among other operations by extremist groups. However, with billions of active webpages, real-time monitoring of all webpages become almost impossible. To narrow down the search domain, there is a need for efficient webpage classification techniques. This research proposed a new approach tagged: SentiPosit-based method. SentiPosit-based method combines features of the Posit-based method and the Sentistrenght-based method for classification of terrorism and extremism webpages. The experiment was carried out on 7500 webpages obtained through TENE-webcrawler by International Cyber Crime Research Centre (ICCRC). The webpages were manually grouped into three classes which include the ‘pro-extremist’, ‘anti-extremist’ and ‘neutral’ with 2500 webpages in each category. A supervised learning algorithm is then applied on the classified dataset in order to build the model. Results obtained was compared with existing classification method using the prediction accuracy and runtime. It was observed that our proposed hybrid approach produced a better classification accuracy compared to existing approaches within a reasonable runtime.

Keywords: sentiposit, classification, extremism, terrorism

Procedia PDF Downloads 261
79 Representation of Islamophobia on Social Media: Facebook Comments Analysis

Authors: Nadia Syed

Abstract:

The digital age has inevitably changed the way in which hate crime is committed. The cyber world has become a highly effective means for individuals and groups to be targeted, harmed, and marginalized , largely through online medium. Facebook has become one of the fastest growing social media platforms. At the end of 2013, Facebook had 1,23bn monthly active users and 757 million daily users who log onto Facebook. Within this online space, there are also an increasing number of online virtual communities, and hate groups who are using this freedom to share a violent, Islamophobic and racist description which attempts to create a aggressive virtual environment. This paper is a research on the rise of Islamophobia and the role of media in spreading it. This paper focusing on how the media especially Facebook is portraying Islam as the religion which promotes violence and ultimately playing a significant role in the global rise of Islamophobia against Muslims. It is important to analyse these ‘new’ communities by monitoring the activities they conduct, because the material they post, potentially can have a harmful impact on community cohesion within society. Additionally, as a result of recent figures that shows an increase in online anti-Muslim abuse, there is a pertinent need to address the issue about Islamophobia on social media. On the whole, this study found Muslims being demonized and vilified online which had manifested through negative attitudes, discrimination, stereotypes, physical threats and online harassment which all had the potential to incite violence or prejudicial action because it disparages and intimidates a protected individual or group.

Keywords: Islamophobia, online, social media, facebook, internet, extremism

Procedia PDF Downloads 82
78 Incorporating Morality Standards in eLearning Process at INU

Authors: Khader Musbah Titi

Abstract:

In this era, traditional education systems do not meet the new challenges created by emerging technologies. On the other hand, eLearning offers all the necessary tools to meet these challenges. Using the Internet has brought numerous benefits to most educational institutions; it has also stretched traditional problems of plagiarism, cheating, stealing, vandalism, and spying into the cyberspace. This research discusses these issues in an eLearning environment. It attempts to provide suggestions and possible solutions to some of these issues. The main aim of this research is to conduct a survey at Irbid National University (INU), one of the oldest and biggest universities in Jordan, to study information related to moral and ethical issues in e-learning environment that affect the construction of the students’ characters in the future. The study will focus on student’s behavior and actions through the Internet using Learning Management System (LMS). Another aim of this research is to analyze the opinions of the instructors and last year students at INU about ethical behavior and interaction through LMS. The results show that educational institutes that use LMS should focus on student character development along with field knowledge. According to disadvantages, the results of the study showed that most of students behave unethically in their online activities (cheating, plagiarism, copy/paste etc.) while studying online courses through LMS. The result showed that instructors play a major role in the character development of students. The result also showed that academic institute must have variant mechanisms and strict policy in LMS to control unethical actions of students.

Keywords: LMS, cyber ethics, e-learning, IT ethics, students’ behaviors

Procedia PDF Downloads 233
77 Identification of Flooding Attack (Zero Day Attack) at Application Layer Using Mathematical Model and Detection Using Correlations

Authors: Hamsini Pulugurtha, V.S. Lakshmi Jagadmaba Paluri

Abstract:

Distributed denial of service attack (DDoS) is one altogether the top-rated cyber threats presently. It runs down the victim server resources like a system of measurement and buffer size by obstructing the server to supply resources to legitimate shoppers. Throughout this text, we tend to tend to propose a mathematical model of DDoS attack; we discuss its relevancy to the choices like inter-arrival time or rate of arrival of the assault customers accessing the server. We tend to tend to further analyze the attack model in context to the exhausting system of measurement and buffer size of the victim server. The projected technique uses an associate in nursing unattended learning technique, self-organizing map, to make the clusters of identical choices. Lastly, the abstract applies mathematical correlation and so the standard likelihood distribution on the clusters and analyses their behaviors to look at a DDoS attack. These systems not exclusively interconnect very little devices exchanging personal data, but to boot essential infrastructures news standing of nuclear facilities. Although this interconnection brings many edges and blessings, it to boot creates new vulnerabilities and threats which might be conversant in mount attacks. In such sophisticated interconnected systems, the power to look at attacks as early as accomplishable is of paramount importance.

Keywords: application attack, bandwidth, buffer correlation, DDoS distribution flooding intrusion layer, normal prevention probability size

Procedia PDF Downloads 208
76 An Original and Suitable Induction Method of Repeated Hypoxic Stress by Hydralazine to Investigate the Integrity of an in Vitro Contact Co-Culture Blood Brain Barrier Model

Authors: Morgane Chatard, Clémentine Puech, Nathalie Perek, Frédéric Roche

Abstract:

Several neurological disorders are linked to repeated hypoxia. The impact of such repeated hypoxic stress, on endothelial cells function of the blood-brain barrier (BBB) is little studied in the literature. Indeed, the study of hypoxic stress in cellular pathways is complex using hypoxia exposure because HIF 1α (factor induced by hypoxia) has a short half life. Our study presents an innovative induction method of repeated hypoxic stress, more reproducible, which allows us to study its impacts on an in vitro contact co-culture BBB model. Repeated hypoxic stress was induced by hydralazine (a mimetic agent of hypoxia pathway) during two hours and repeated during 24 hours. Then, BBB integrity was assessed by permeability measurements (transendothelial electrical resistance and membrane permeability), tight junction protein expressions (cell-ELISA and confocal microscopy) and by studying expression and activity of efflux transporters. First, this study showed that repeated hypoxic stress leads to a BBB’s dysfunction illustrated by a significant increase in permeability. This loss of membrane integrity was linked to a significant decrease of tight junctions’ protein expressions, facilitating a possible transfer of potential cytotoxic compounds in the brain. Secondly, we demonstrated that brain microvascular endothelial cells had set-up defence mechanism. These endothelial cells significantly increased the activity of their efflux transporters which was associated with a significant increase in their expression. In conclusion, repeated hypoxic stress lead to a loss of BBB integrity with a decrease of tight junction proteins. In contrast, endothelial cells increased the expression of their efflux transporters to fight against cytotoxic compounds brain crossing. Unfortunately, enhanced efflux activity could also lead to reducing pharmacological drugs delivering to the brain in such hypoxic conditions.

Keywords: BBB model, efflux transporters, repeated hypoxic stress, tigh junction proteins

Procedia PDF Downloads 284
75 Developing Manufacturing Process for the Graphene Sensors

Authors: Abdullah Faqihi, John Hedley

Abstract:

Biosensors play a significant role in the healthcare sectors, scientific and technological progress. Developing electrodes that are easy to manufacture and deliver better electrochemical performance is advantageous for diagnostics and biosensing. They can be implemented extensively in various analytical tasks such as drug discovery, food safety, medical diagnostics, process controls, security and defence, in addition to environmental monitoring. Development of biosensors aims to create high-performance electrochemical electrodes for diagnostics and biosensing. A biosensor is a device that inspects the biological and chemical reactions generated by the biological sample. A biosensor carries out biological detection via a linked transducer and transmits the biological response into an electrical signal; stability, selectivity, and sensitivity are the dynamic and static characteristics that affect and dictate the quality and performance of biosensors. In this research, a developed experimental study for laser scribing technique for graphene oxide inside a vacuum chamber for processing of graphene oxide is presented. The processing of graphene oxide (GO) was achieved using the laser scribing technique. The effect of the laser scribing on the reduction of GO was investigated under two conditions: atmosphere and vacuum. GO solvent was coated onto a LightScribe DVD. The laser scribing technique was applied to reduce GO layers to generate rGO. The micro-details for the morphological structures of rGO and GO were visualised using scanning electron microscopy (SEM) and Raman spectroscopy so that they could be examined. The first electrode was a traditional graphene-based electrode model, made under normal atmospheric conditions, whereas the second model was a developed graphene electrode fabricated under a vacuum state using a vacuum chamber. The purpose was to control the vacuum conditions, such as the air pressure and the temperature during the fabrication process. The parameters to be assessed include the layer thickness and the continuous environment. Results presented show high accuracy and repeatability achieving low cost productivity.

Keywords: laser scribing, lightscribe DVD, graphene oxide, scanning electron microscopy

Procedia PDF Downloads 105
74 Hypolipidemic and Antioxidant Effects of Mycelial Polysaccharides from Calocybe indica in Hyperlipidemic Rats Induced by High-Fat Diet

Authors: Govindan Sudha, Mathumitha Subramaniam, Alamelu Govindasamy, Sasikala Gunasekaran

Abstract:

The aim of this study was to investigate the protective effect of Hypsizygus ulmarius polysaccharides (HUP) on reducing oxidative stress, cognitive impairment and neurotoxicity in D-galactose induced aging mice. Mice were subcutaneously injected with D-galactose (150 mg/kg per day) for 6 weeks and were administered HUP simultaneously. Aged mice receiving vitamin E (100 mg/kg) served as positive control. Chronic administration of D-galactose significantly impaired cognitive performance oxidative defence and mitochondrial enzymes activities as compared to control group. The results showed that HUP (200 and 400 mg/kg) treatment significantly improved the learning and memory ability in Morris water maze test. Biochemical examination revealed that HUP significantly increased the decreased activities of superoxide dismutase (SOD), catalase (CAT), glutathione peroxidase (GPx), glutathione reductase (GR), glutathione-S-transferase (GST), mitochondrial enzymes-NADH dehydrogenase, malate dehydrogenase (MDH), isocitrate dehydrogenase (ICDH), Na+K+, Ca2+, Mg2+ATPase activities, elevated the lowered total anti-oxidation capability (TAOC), glutathione (GSH), vitamin C and decreased the raised acetylcholinesterase (AChE) activities, malondialdehyde (MDA), hydroperoxide (HPO), protein carbonyls (PCO), advanced oxidation protein products (AOPP) levels in brain of aging mice induced by D-gal in a dose-dependent manner. In conclusion, present study highlights the potential role of HUP against D-galactose induced cognitive impairment, biochemical and mitochondrial dysfunction in mice. In vitro studies on the effect of HUP on scavenging DPPH, ABTS, DMPD, OH radicals, reducing power, B-carotene bleaching and lipid peroxidation inhibition confirmed the free radical scavenging and antioxidant activity of HUP. The results suggest that HUP possesses anti-aging efficacy and may have potential in treatment of neurodegenerative diseases.

Keywords: aging, antioxidants, mushroom, neurotoxicity

Procedia PDF Downloads 514