Search results for: cyber defense
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 714

Search results for: cyber defense

384 Evaluation of Monoterpenes Induction in Ugni molinae Ecotypes Subjected to a Red Grape Caterpillar (Lepidoptera: Arctiidae) Herbivory

Authors: Manuel Chacon-Fuentes, Leonardo Bardehle, Marcelo Lizama, Claudio Reyes, Andres Quiroz

Abstract:

The insect-plant interaction is a complex process in which the plant is able to release chemical signaling that modifies the behavior of insects. Insect herbivory can trigger mechanisms that allow the increase in the production of secondary metabolites that allow coping against the herbivores. Monoterpenes are a kind of secondary metabolites involved in direct defense acting as repellents of herbivorous or even in indirect defense acting as attractants for insect predators. In addition, an increase of the monoterpenes concentration is an effect commonly associated with the herbivory. Hence, plants subjected to damage by herbivory increase the monoterpenes production in comparison to plants without herbivory. In this framework, co-evolutionary aspects play a fundamental role in the adaptation of the herbivorous to their host and in the counter-adaptive strategies of the plants to avoid the herbivorous. In this context, Ugni molinae 'murtilla' is a native shrub from Chile characterized by its antioxidant activity mainly related to the phenolic compounds presents in its fruits. The larval stage of the red grape caterpillar Chilesia rudis Butler (Lepidoptera: Arctiidae) has been reported as an important defoliator of U. molinae. This insect is native from Chile and probably has been involved in a co-evolutionary process with murtilla. Therefore, we hypothesized that herbivory by the red grape caterpillar increases the emission of monoterpenes in Ugni molinae. Ecotypes 19-1 and 22-1 of murtilla were established and maintained at 25° C in the Laboratorio de Química Ecológica at Universidad de La Frontera. Red grape caterpillars of ⁓40 mm were collected near to Temuco (Chile) from grasses, and they were deprived of food for 24 h before performing the assays. Ten caterpillars were placed on the foliage of the ecotypes 19-1 and 22-1 and allowed to feed during 48 h. After this time, caterpillars were removed from the ecotypes and monoterpenes were collected. A glass chamber was used to enclose the ecotypes and a Porapak-Q column was used to trap the monoterpenes. After 24 h of capturing, columns were desorbed with hexane. Then, samples were injected in a gas chromatograph coupled to mass spectrometer and monoterpenes were determined according to the NIST library. All the experiments were performed in triplicate. Results showed that α-pinene, β-phellandrene, limonene, and 1,8 cineole were the main monoterpenes released by murtilla ecotypes. For the ecotype 19-1, the abundance of α-pinene was significantly higher in plants subjected to herbivory (100%) in relation to control plants (54.58%). Moreover, β-phellandrene and 1,8 cineole were observed only in control plants. For ecotype 22-1, there was no significant difference in monoterpenes abundance. In conclusion, the results suggest a trade-off of β-phellandrene and 1,8 cineole in response to herbivory damage by red grape caterpillar generating an increase in α-pinene abundance.

Keywords: Chilesia rudis, gas chromatography, monoterpenes, Ugni molinae

Procedia PDF Downloads 132
383 The Implementation of Information Security Audits in Public Sector: Perspective from Indonesia

Authors: Nur Imroatun Sholihat, Gresika Bunga Sylvana

Abstract:

Currently, cyber attack became an incredibly serious problem due to its increasing trend all over the world. Therefore, information security becomes prominent for every organization including public sector organization. In Indonesia, unfortunately, Ministry of Finance (MoF) is the only public sector organization that has already formally established procedure to assess its information security adequacy by performing information security audits (November 2017). We assess the implementation of information security audits in the MoF using qualitative data obtained by interviewing IT auditors and by analysis of related documents. For this reason, information security audit practice in the MoF could become the acceptable benchmark for all other public sector organizations in Indonesia. This study is important because, to the best of the author’s knowledge, our research into information security audits practice in Indonesia’s public sector have not been found yet. Results showed that information security audits performed mostly by doing pentest (penetration testing) to MoF’s critical applications.

Keywords: information security audit, information technology, Ministry of Finance of Indonesia, public sector organization

Procedia PDF Downloads 205
382 Effects of Narghile Smoking in Tongue, Trachea and Lung

Authors: Sarah F. M. Pilati, Carolina S. Flausino, Guilherme F. Hoffmeister, Davi R. Tames, Telmo J. Mezadri

Abstract:

The effects that may be related to narghile smoking in the tissues of the oral cavity, trachea and lung and associated inflammation has been the question raised lately. The objective of this study was to identify histopathological changes and the presence of inflammation through the exposure of mice to narghile smoking through a whole-body study. The animals were divided in 4 groups with 5 animals in each group, being: one control group, one with 7 days of exposure, 15 days and the last one with 30 days. The animals were exposed to the conventional hookah smoke from Mizo brand with 0.5% percentage of unwashed tobacco and the EcOco brand coconut fiber having a dimension of 2cm × 2cm. The duration of the session was 30 minutes / day per 7, 15 and 30 days. The tobacco smoke concentration at which test animals were exposed was 35 ml every two seconds while the remaining 58 seconds were pure air. Afterward, the mice were sacrificed and submitted to histological evaluation through slices. It was found in the tongue of the 7-day group the presence in epithelium areas with acanthosis, hyperkeratosis and epithelial projections. In-depth, more intense inflammation was observed. All alteration processes increased significantly as the days of exposure increased. In trachea, with the 7-day group, there was a decrease in thickening of the pseudostratified epithelium and a slight decrease in lashes, giving rise to the metaplasia process, a process that was established in the 31-day sampling when the epithelium became stratified. In the conjunctive tissue, it was observed the presence of defense cells and formation of new vessels, evidencing the chronic inflammatory process, which decreased in the course of the samples due to the deposition of collagen fibers as seen in the 15 and 31 days groups. Among the structures of the lung, the study focused on the bronchioles and alveoli. From the 7-day group, intra-alveolar septum thickness increased, alveolar space decreased, inflammatory infiltrate with mononuclear and defense cells and new vessels formation were observed, increasing the number of red blood cells in the region. The results showed that with the passing of the days a progressive increase of the signs of changes in the region was observed, a factor that shows that narghile smoking stimulates alterations mainly in the alveoli (place where gas exchanges occur that should not present alterations) calling attention to the harmful and aggressive effect of narghile smoking. These data also highlighted the harmful effect of smoking, since the presence of acanthosis, hyperkeratosis, epithelial projections and inflammation evidences the cellular alteration process for the tongue tissue protection. Also, the narghile smoking stimulates both epithelial and inflammatory changes in the trachea, in addition to a process of metaplasia, a factor that reinforces the harmful effect and the carcinogenic potential of the narghile smoking.

Keywords: metaplasia, inflammation, pathological constriction, hyperkeratosis

Procedia PDF Downloads 148
381 Design and Implementation of a Cross-Network Security Management System

Authors: Zhiyong Shan, Preethi Santhanam, Vinod Namboodiri, Rajiv Bagai

Abstract:

In recent years, the emerging network worms and attacks have distributive characteristics, which can spread globally in a very short time. Security management crossing networks to co-defense network-wide attacks and improve the efficiency of security administration is urgently needed. We propose a hierarchical distributed network security management system (HD-NSMS), which can integrate security management across multiple networks. First, we describe the system in macrostructure and microstructure; then discuss three key problems when building HD-NSMS: device model, alert mechanism, and emergency response mechanism; lastly, we describe the implementation of HD-NSMS. The paper is valuable for implementing NSMS in that it derives from a practical network security management system (NSMS).

Keywords: network security management, device organization, emergency response, cross-network

Procedia PDF Downloads 137
380 MWCNT/CuFe10Al2O19/Polyanilie Nanocomposite for Microwave Absorbing Applications

Authors: Pallab Bhattacharya, C. K. Das

Abstract:

Development of microwave absorbing material is a growing field of research in both the commercial and defense sector, and also to enrich the field of stealth technology. The recent work is attentive to the preparation of nanocomposite based on acid modified MWCNT, hexagonal shaped magnetic M-type hexaferrite (CuFe10Al2O19) and polyaniline. CuFe10Al2O19 was prepared by a facile chemical co-precipitation method. An in-situ approach was employed for the coating of polyaniline on MWCNT/CuFe10Al2O19 nanocomposite. The final fabrication of this nanocomposite for microwave measurements was done suitably in the matrix of thermoplastic polyurethane with 10% filler content. The nanocomposites showed the maximum reflection loss of -60.2 dB (in X-band) at the thickness of 2.5 mm with a broad absorption range in contrast to the pristine MWCNT and CuFe10Al2O19. Addition of PANI improves the microwave absorption property of the nanocomposites. The thermal stability of the prepared nanocomposites is also very high.

Keywords: magnetic materials, microwave absorption, MWCNT, nanocomposites

Procedia PDF Downloads 271
379 Visual Overloaded on User-Generated Content by the Net Generation: Participatory Cultural Viewpoint

Authors: Hasanah Md. Amin

Abstract:

The existence of cyberspace and its growing contents is real and overwhelming. Visual as one of the properties of cyber contents is increasingly becoming more significant and popular among creator and user. The visual and aesthetic of the content is consistent with many similarities. Aesthetic, although universal, has slight differences across the world. Aesthetic power could impress, influence, and cause bias among the users. The content creator who knows how to manipulate this visuals and aesthetic expression can dominate the scenario and the user who is ‘expressive literate’ will gain much from the scenes. User who understands aesthetic will be rewarded with competence, confidence, and certainly, a personality enhanced experience in carrying out a task when participating in this chaotic but promising cyberworld. The aim of this article is to gain knowledge from related literature and research regarding User-Generated Content (UGC), which focuses on aesthetic expression by the Net generation. The objective of this preliminary study is to analyze the aesthetic expression linked to visual from the participatory cultural viewpoint looking for meaning, value, patterns, and characteristics.

Keywords: visual overloaded, user-generated content, net generation, visual arts

Procedia PDF Downloads 418
378 Modeling Intelligent Threats: Case of Continuous Attacks on a Specific Target

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we treat a model that falls in the area of protecting targeted systems from intelligent threats including terrorism. We introduce the concept of system survivability, in the context of continuous attacks, as the probability that a system under attack will continue operation up to some fixed time t. We define a constant attack rate (CAR) process as an attack on a targeted system that follows an exponential distribution. We consider the superposition of several CAR processes. From the attacker side, we determine the optimal attack strategy that minimizes the system survivability. We also determine the optimal strengthening strategy that maximizes the system survivability under limited defensive resources. We use operations research techniques to identify optimal strategies of each antagonist. Our results may be used as interesting starting points to develop realistic protection strategies against intentional attacks.

Keywords: CAR processes, defense/attack strategies, exponential failure, survivability

Procedia PDF Downloads 370
377 The Role of Access Control Techniques in Creating a Safe Cyberspace for Children

Authors: Sara Muslat Alsahali, Nout Mohammed Alqahtani

Abstract:

Digital technology has changed the world, and with the increasing number of children accessing the Internet, it has now become an integral part of children's lives from their early years. With the rapid development of digital technology, the risks children face on the internet also evolve from cyberbullying to misuse, sexual exploitation, and abuse of their private information over the Internet. Digital technology, with its advantages and disadvantages, is now a fact of our life. Therefore, knowledge of how to reduce its risks and maximize its benefits will help shape the growth and future of a new generation of digital citizens. This paper will discuss access control techniques that help to create secure cyberspace where children can be safe without depriving them of their rights and freedom to use the internet and preventing them from its benefits. Also, it sheds light on its challenges and problems by classifying the methods of parental controlling into two possibilities asynchronous and synchronous techniques and choosing YouTube as a case study of access control techniques.

Keywords: access control, cyber security, kids, parental monitoring

Procedia PDF Downloads 110
376 Defense Strategy: Perang Semesta Strategy as a Reliable National Security System of Indonesia

Authors: Erdianta S, Chastiti M. Wulolo, IDK Kerta Widana

Abstract:

Perang Semesta strategy is a national security system used by Republic of Indonesia. It comes from local wisdom, cultural, and hereditary of Indonesia itself. This system involves all people and all nation resources, and it is early prepared by government and conducted totality, integratedly, directly, and continously to enforce a sovereignty of country, teritorial integrity and the safety of the whole nation from threats. This study uses a qualitative content analysis method by studying, recording, and analyzing government policy. The Perang Semesta strategy divided into main, backup, and supporting components. Every component has its function and responsibility in security perspective. So when an attack comes, all people of Indonesia will voluntary to defend the country. Perang Semesta strategy is a national security system which becomes the most reliable strategy toward geography and demography of Indonesia.

Keywords: Indonesia, Perang Semesta strategy, national security, local wisdom

Procedia PDF Downloads 429
375 Towards Resilient Cloud Computing through Cyber Risk Assessment

Authors: Hilalah Alturkistani, Alaa AlFaadhel, Nora AlJahani, Fatiha Djebbar

Abstract:

Cloud computing is one of the most widely used technology which provides opportunities and services to government entities, large companies, and standard users. However, cybersecurity risk management studies of cloud computing and resiliency approaches are lacking. This paper proposes resilient cloud cybersecurity risk assessment and management tailored specifically, to Dropbox with two approaches:1) technical-based solution motivated by a cybersecurity risk assessment of cloud services, and 2)a target personnel-based solution guided by cybersecurity-related survey among employees to identify their knowledge that qualifies them withstand to any cyberattack. The proposed work attempts to identify cloud vulnerabilities, assess threats and detect high risk components, to finally propose appropriate safeguards such as failure predicting and removing, redundancy or load balancing techniques for quick recovery and return to pre-attack state if failure happens.

Keywords: cybersecurity risk management plan, resilient cloud computing, cyberattacks, cybersecurity risk assessment

Procedia PDF Downloads 113
374 Threat Analysis: A Technical Review on Risk Assessment and Management of National Testing Service (NTS)

Authors: Beenish Urooj, Ubaid Ullah, Sidra Riasat

Abstract:

National Testing Service-Pakistan (NTS) is an agency in Pakistan that conducts student success appraisal examinations. In this research paper, we must present a security model for the NTS organization. The security model will depict certain security countermeasures for a better defense against certain types of breaches and system malware. We will provide a security roadmap, which will help the company to execute its further goals to maintain security standards and policies. We also covered multiple aspects in securing the environment of the organization. We introduced the processes, architecture, data classification, auditing approaches, survey responses, data handling, and also training and awareness of risk for the company. The primary contribution is the Risk Survey, based on the maturity model meant to assess and examine employee training and knowledge of risks in the company's activities.

Keywords: NTS, risk assessment, threat factors, security, services

Procedia PDF Downloads 51
373 Effect of Mangrove Forests in Coastal Flood and Erosion

Authors: Majid Samiee Zenoozian

Abstract:

This paper studies the susceptibility of local settlements in the gulf of Oman mangrove forest zone to flooding and progressesconsiderate of acuities and reactions to historical and present coastal flooding.it is indirect thaterosionsproduced in coastal zones by the change of mangrove undergrowthsubsequent from the enduring influence of persons since the late 19th century. Confronted with the increasing impact of climate change on climate ambitiousalarms such as flooding and biodiversity damage, handling the relationship between mangroves and their atmosphere has become authoritative for their defense. Coastal flood dangers are increasing quickly. We offer high resolution approximations of the financial value of mangroves forests for flood risk discount. We progress a probabilistic, process-based estimate of the properties of mangroves on avoidanceharms to people and property. More significantly, it also establishes how the incessantsqualor of this significant ecosystem has the potential to unfavorably influence the future cyclone persuadeddangers in the area.

Keywords: mangrove forest, coastal, flood, erosion

Procedia PDF Downloads 90
372 Moderate Holism as an Explanation for Linguistic Phenomena

Authors: Kênio Angelo Dantas Freitas Estrela

Abstract:

Traditionally meaning holism is a theory that is related to the meaning attributed to words and their relationships to other words in a language. This theory can be more specifically defined as a defense of the mutual interdependence of all items of linguistic knowledge, so that, for example, to understand the meaning of a given expression, it is necessary to understand a large sector of the language in question or, even the complete language. The aim of this paper is to present a moderate version of meaning holism, which argues that, among other things, meaning holism does not imply the thesis of instability - if there is the change of belief about an object, there is a change of meaning - and, in this way, it is possible to attribute meanings to objects admitting changes of opinions and then beliefs. It will be shown how this version of holism gives an account of the main criticisms made of meaning holism in the last decades and also show how this theory can justify linguistic phenomena (like vagueness and polysemy) that are often treated as problems of language. Finally, it will also be argued that these linguistic phenomena are intrinsic to languages and that the moderate version of meaning holism can justify the occurrence of these phenomena.

Keywords: linguistics, meaning holism, philosophy of language, semantics

Procedia PDF Downloads 233
371 Protective Effect of Cinnamomum zeylanicum Bark Extract against Doxorubicin Induced Cardiotoxicity: A Preliminary Study

Authors: J. A. N. Sandamali, R. P. Hewawasam, K. A. P. W. Jayatilaka, L. K. B. Mudduwa

Abstract:

Introduction: Doxorubicin is widely used in the treatment of solid organ tumors and hematological malignancies, but the dose-dependent cardiotoxicity due to free radical formation compromises its clinical utility. Therapeutic strategies which enhance cellular endogenous defense systems have been identified as promising approaches to combat oxidative stress-associated conditions. Cinnamomum zeylanicum (Ceylon cinnamon) has a number antioxidant compounds, which can effectively scavenge reactive oxygen including superoxide anions, hydroxyl radicals and as well as other free radicals. Therefore, the objective of the study was to elucidate the most effective dose of Cinnamomum bark extract which ameliorates doxorubicin-induced cardiotoxicity. Materials and methods: Wistar rats were divided into seven groups of 10 animals in each. Group 1: normal control (distilled water, orally, for 14 days, 10 mL/kg saline, ip, after 16 hours fast on the 11th day); Group 2: doxorubicin control (distilled water, orally, for 14 days, 18 mg/kg doxorubicin, ip, after 16 hour fast on the 11th day); Groups 3-7: five doses of freeze dried aqueous bark extracts (0.125, 0.25, 0.5, 1.0, 2.0g/kg, orally, daily for 14 days, 18 mg/kg doxorubicin, ip, after 16 hours fast on the 11th day). Animals were sacrificed on the 15th day and blood was collected for the estimation of cardiac troponin I (cTnI), AST and LDH concentrations and myocardial tissues were collected for histopathological assessment of myocardial damage and irreversible changes were graded by developing a score. Results: cTnI concentration of groups 1-7 were 0, 161.9, 128.6, 95.9, 38, 19.41 & 12.36 pg/mL showing significant differences (p<0.05) between group 2 and groups 4-7. In groups 1-7, serum AST concentration were 26.82, 68.1, 37.18, 36.23, 26.8, 26.62 & 22.43U/L and LDH concentrations were 1166.13, 2428.84, 1658.35, 1474.34, 1277.58, 1110.21 & 974.40U/L and a significant difference (p<0.05) was observed between group 2 and groups 3-7. The maximum score for myocardial necrosis was observed in group 2. Parallel to the increase of the dosage of plant extract, a gradual reduction of the score for myocardial necrosis was observed in groups 3-7. Reversible histological changes such as vacuolation, congestion were observed in group 2 and all plant treated groups. Haemorrhages, inflammatory cell infiltrations, and interstitial oedema were observed in group 2, but absent in groups treated with higher doses of the plant extract. Discussion & Conclusion: According to the in vitro antioxidant assays performed, Cinnamomum zeylanicum (Ceylon cinnamon) bark possesses high amounts of polyphenolic substances and high antioxidant activity. The present study showed that Cinnamomum zeylanicum extract at 2.0 g/kg possesses the most significant cardioprotective effect against doxorubicin-induced cardiotoxicity. It can be postulated that pretreatment with Cinnamomum bark extract may replenish the cardiomyocytes with antioxidants that are needed for the defense against oxidative stress induced by doxorubicin.

Keywords: cardioprotection, Cinnamomum zeylanicum, doxorubicin, free radicals

Procedia PDF Downloads 145
370 Using A Blockchain-Based, End-to-End Encrypted Communication System Between Mobile Terminals to Improve Organizational Privacy

Authors: Andrei Bogdan Stanescu, Robert Stana

Abstract:

Creating private and secure communication channels between employees has become a critical aspect in order to ensure organizational integrity and avoid leaks of sensitive information. With the widespread use of modern methods of disrupting communication between users, real use-cases of advanced encryption mechanisms have emerged to avoid cyber-attackers that are willing to intercept private conversations between critical employees in an organization. This paper aims to present a custom implementation of a messaging application named “Whisper” that uses end-to-end encryption (E2EE) mechanisms and blockchain-related components to protect sensitive conversations and mitigate the risks of information breaches inside organizations. The results of this research paper aim to expand the areas of applicability of E2EE algorithms and integrations with private blockchains in chat applications as a viable method of enhancing intra-organizational communication privacy.

Keywords: end-to-end encryption, mobile communication, cryptography, communication security, data privacy

Procedia PDF Downloads 61
369 Development of Management System of the Experience of Defensive Modeling and Simulation by Data Mining Approach

Authors: D. Nam Kim, D. Jin Kim, Jeonghwan Jeon

Abstract:

Defense Defensive Modeling and Simulation (M&S) is a system which enables impracticable training for reducing constraints of time, space and financial resources. The necessity of defensive M&S has been increasing not only for education and training but also virtual fight. Soldiers who are using defensive M&S for education and training will obtain empirical knowledge and know-how. However, the obtained knowledge of individual soldiers have not been managed and utilized yet since the nature of military organizations: confidentiality and frequent change of members. Therefore, this study aims to develop a management system for the experience of defensive M&S based on data mining approach. Since individual empirical knowledge gained through using the defensive M&S is both quantitative and qualitative data, data mining approach is appropriate for dealing with individual empirical knowledge. This research is expected to be helpful for soldiers and military policy makers.

Keywords: data mining, defensive m&s, management system, knowledge management

Procedia PDF Downloads 230
368 The Lightener of Love: The World Peace Religion

Authors: Abdul Razzaq

Abstract:

It is known that every human society throughout the world and throughout history, the various religions and their theologies, ethics, and traditions influence everything in their life, shaping socio-economic and political ideas, attitudes and institutions. It is observed that religious teachings and traditions shape how people respond to each other in their daily social inter-course and interaction in the community at large. The majorities of us preserves and protect our own religious beliefs and traditions as generally they symbolize our essential identities, theologically, historically, culturally, socially, and even politically. Our religious faiths symbolize our dignity as persons and our very souls as communities and individuals. It thus goes without saying that in our multi-racial and multi-religious society, the only way for us to live in peace and harmony is for us to live in peaceful co-existence. It is important for us to recognize, understand, accept and respect each other regardless of our respective belief. The history of interfaith is as ancient as the religions since men and women when not at war with their neighbors have always made an effort to understand them (not least because understanding is a strategy for defense, but also because for as long as there is dialogue wars are delayed).

Keywords: Islam, religion, peace, society

Procedia PDF Downloads 405
367 The Lightener of Love - The World Peace

Authors: Abdul Razzaq

Abstract:

It is known that every human society throughout the world and throughout history, the various religions and their theologies, ethics, and traditions influence everything in their life, shaping socio-economic and political ideas, attitudes and institutions. It is observed that religious teachings and traditions shape how people respond to each other in their daily social inter-course and interaction in the community at large. The majorities of us preserves and protect our own religious beliefs and traditions as generally they symbolize our essential identities, theologically, historically, culturally, socially, and even politically. Our religious faiths symbolize our dignity as persons and our very souls as communities and individuals. It thus goes without saying that in our multi-racial and multi-religious society, the only way for us to live in peace and harmony is for us to live in peaceful co-existence. It is important for us to recognize, understand, accept and respect each other regardless of our respective belief. The history of interfaith is as ancient as the religions since men and women when not at war with their neighbors have always made an effort to understand them (not least because understanding is a strategy for defense, but also because for as long as there is dialogue wars are delayed).

Keywords: Islam, interfaith, Sects, world, piece

Procedia PDF Downloads 658
366 A Model Suggestion on Competitiveness and Sustainability of SMEs in Developing Countries

Authors: Ahmet Diken, Tahsin Karabulut

Abstract:

The factor which developing countries are in need is capital. Such countries make an effort to increase their income in order to meet their expenses for employment, infrastructure, superstructure investments, education, health and defense. The sole income of the countries is taxes collected from businesses. The businesses should drive profit and return in order to be able to toll. In a world where competition exists, different strategies may be followed by business in developing countries and they must specify their target markets. İn order to minimize cost and maximize profit, SMEs have to concentrate on target markets and select cost oriented strategy. In this study, a theoretical model is suggested that SME firms have to act as cluster between each other, and also must be optimal provider for large scale firms. SMEs’ policy must be supported by public. This relationship can benefit large scale firms to have brand over the world, and this organization increases value added for developing countries.

Keywords: competitiveness, countries, SMEs developing, sustainability

Procedia PDF Downloads 293
365 Development of High Temperature Eutectic Oxide Ceramic Matrix Composites

Authors: Yağmur Can Gündoğan, Kübra Gürcan Bayrak, Ece Özerdem, Buse Katipoğlu, Erhan Ayas, Rifat Yılmaz

Abstract:

Eutectic oxide based ceramic matrix composites have a unique microstructure that does not include grain boundary in the form of a continuous network. Because of this, these materials have the properties of perfect high-temperature strength, creep strength, and high oxidation strength. Mechanical properties of them are much related to occurring solidification structures during eutectic reactions. One of the most important production methods of this kind of material is the process of vacuum arc melting. Within scope of this studying, it is aimed to investigate the production of Al₂O₃-YAG-based eutectic ceramics by Arc melting and Spark Plasma Sintering methods for use in aerospace and defense industries where high-temperature environments play an important role and to examine the effects of ZrO₂ and LiF additions on microstructure development and mechanical properties.

Keywords: alumina, composites, eutectic, YAG

Procedia PDF Downloads 94
364 Deposit Guarantee Fund: One Perspective

Authors: Rute Abreu, Fátima David, Liliane Cristina Segura

Abstract:

The Deposit Guarantee Fund (DGF) and its communication with the Society, in general, and with the deposit client of Financial Institutions, in particular, is discussed through the challenges of the accounting and financial report. The Bank of Portugal promotes the Portuguese Deposit Guarantee Fund (PDGF) as a financial institution that enhanced the market confidence and stability on the deposit-insurance system. Due to the nature of their functions, it must be subject to regulation and supervision that provides a first line of defense against adversely affect confidence on the Portuguese financial market. First, this research provides evidence of the effectiveness of the protection mechanisms on the deposit insurance system, which provides high and equal protection to all stakeholders. Second, it emphasizes the need of requirements of rigorous accounting process and effective financial report to reduce the moral hazard implications. Third, this research focuses on the need of total disclosure of the financial information which gives higher transparency and protection to deposit client of financial institutions.

Keywords: deposit guarantee fund, Portugal, accounting, financial report

Procedia PDF Downloads 414
363 Current Status of Industry 4.0 in Material Handling Automation and In-house Logistics

Authors: Orestis Κ. Efthymiou, Stavros T. Ponis

Abstract:

In the last decade, a new industrial revolution seems to be emerging, supported -once again- by the rapid advancements of Information Technology in the areas of Machine-to-Machine (M2M) communication permitting large numbers of intelligent devices, e.g. sensors to communicate with each other and take decisions without any or minimum indirect human intervention. The advent of these technologies have triggered the emergence of a new category of hybrid (cyber-physical) manufacturing systems, combining advanced manufacturing techniques with innovative M2M applications based on the Internet of Things (IoT), under the umbrella term Industry 4.0. Even though the topic of Industry 4.0 has attracted much attention during the last few years, the attempts of providing a systematic literature review of the subject are scarce. In this paper, we present the authors’ initial study of the field with a special focus on the use and applications of Industry 4.0 principles in material handling automations and in-house logistics. Research shows that despite the vivid discussion and attractiveness of the subject, there are still many challenges and issues that have to be addressed before Industry 4.0 becomes standardized and widely applicable.

Keywords: Industry 4.0, internet of things, manufacturing systems, material handling, logistics

Procedia PDF Downloads 109
362 IT and Security Experts' Innovation and Investment Front for IT-Entrepreneurship in Pakistan

Authors: Ahmed Mateen, Zhu Qingsheng, Muhammad Awais, Muhammad Yahya Saeed

Abstract:

This paper targets the rising factor of entrepreneurship innovation, which lacks in Pakistan as compared to the other countries or the regions like China, India, and Malaysia, etc. This is an exploratory and explanatory study. Major aspects have identified as the direction for the policymakers while highlighting the issues in true spirit. IT needs to be considered not only as a technology but also as itself growing as a new community. IT management processes are complex and broad, so generally requires extensive attention to the collective aspects of human variables, capital and technology. In addition, projects tend to have a special set of critical success factors, and if these are processed and given attention, it will improve the chances of successful implementation. This is only possible with state of the art intelligent decision support systems and accumulating IT staff to some extent in decision processes. This paper explores this issue carefully and discusses six issues to observe the implemented strength and possible enhancement.

Keywords: security and defense forces, IT-incentives, big IT-players, IT-entrepreneurial-culture

Procedia PDF Downloads 196
361 Genetic Algorithms Based ACPS Safety

Authors: Emine Laarouchi, Daniela Cancila, Laurent Soulier, Hakima Chaouchi

Abstract:

Cyber-Physical Systems as drones proved their efficiency for supporting emergency applications. For these particular applications, travel time and autonomous navigation algorithms are of paramount importance, especially when missions are performed in urban environments with high obstacle density. In this context, however, safety properties are not properly addressed. Our ambition is to optimize the system safety level under autonomous navigation systems, by preserving performance of the CPS. At this aim, we introduce genetic algorithms in the autonomous navigation process of the drone to better infer its trajectory considering the possible obstacles. We first model the wished safety requirements through a cost function and then seek to optimize it though genetics algorithms (GA). The main advantage in the use of GA is to consider different parameters together, for example, the level of battery for navigation system selection. Our tests show that the GA introduction in the autonomous navigation systems minimize the risk of safety lossless. Finally, although our simulation has been tested for autonomous drones, our approach and results could be extended for other autonomous navigation systems such as autonomous cars, robots, etc.

Keywords: safety, unmanned aerial vehicles , CPS, ACPS, drones, path planning, genetic algorithms

Procedia PDF Downloads 160
360 The Impact of Artificial Intelligence on Human Rights Priciples and Obligations

Authors: Rady Farag Aziz Ibrahim

Abstract:

The gap between Islamic terrorism and human rights has become an important issue in the fight against Islamic terrorism worldwide. This situation is repeated because terrorism and human rights are interconnected in such a way that when the former begins, the latter becomes subject to violence. This unknown relationship was recognized in the Vienna Declaration and Program of Action adopted at the International Conference on Human Rights held in Vienna on 25 June 1993, confirming that terrorist acts, in all their forms and manifestations, aim to destroy the rights of individuals. humanity to destroy. Therefore, Islamic terrorism is a violation of basic human rights. For this purpose, the first part of the article will focus on the relationship between terrorism and human rights and the synergy between these two concepts. The second part then explores the emerging concept of cyber threats and how they exist. Additionally, technology analysis will be conducted against threats based on human rights. This will be achieved through analysis of the concept of 'securitization' of human rights and by striking a balance between counter-terrorism measures and the protection of human rights at all costs. This article concludes with recommendations on how to balance terrorism and human rights today.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development

Procedia PDF Downloads 14
359 Banking Innovation and Customers' Satisfaction in Nigeria: A Case Study of Some Selected Banks

Authors: Jameelah O. Yaqub

Abstract:

The financial industry all over the world has undergone and still undergoing great transformation especially with the introduction of e-products which involves the use of computers and telecommunications to enable banking transactions to be done by telephone or computer rather than by humans. The adoption of e-banking in Nigeria is becoming more popular with customers now being able to use the ATM cards for different transactions. The internet banking, POS machines, telephone banking as well as mobile banking are some other e-products being used in Nigeria. This study examines how satisfied bank customers are with the e-products. The study found that the ATM is the most popular e-products among bank customers in Nigeria; followed by the POS. The least use of the e-products is telephone banking. The study also found that visits to banks for transactions declined with the use of e-products. The chi-square analysis shows that there is significant relationship between the use of banks’ e-products and customers’ satisfaction. One of the major reason adduced by respondents for low usage of e-products is insecurity or fear of cyber fraud, it is therefore recommended that banks should provide adequate. Security for transactions and ensure the proper backing up of critical data files. In addition, government should ensure stable electricity supply to reduce banks’ running costs and consequently, customers’ cost of transactions.

Keywords: banks, e-products, innovation, Nigeria

Procedia PDF Downloads 319
358 System Security Impact on the Dynamic Characteristics of Measurement Sensors in Smart Grids

Authors: Yiyang Su, Jörg Neumann, Jan Wetzlich, Florian Thiel

Abstract:

Smart grid is a term used to describe the next generation power grid. New challenges such as integration of renewable and decentralized energy sources, the requirement for continuous grid estimation and optimization, as well as the use of two-way flows of energy have been brought to the power gird. In order to achieve efficient, reliable, sustainable, as well as secure delivery of electric power more and more information and communication technologies are used for the monitoring and the control of power grids. Consequently, the need for cybersecurity is dramatically increased and has converged into several standards which will be presented here. These standards for the smart grid must be designed to satisfy both performance and reliability requirements. An in depth investigation of the effect of retrospectively embedded security in existing grids on it’s dynamic behavior is required. Therefore, a retrofitting plan for existing meters is offered, and it’s performance in a test low voltage microgrid is investigated. As a result of this, integration of security measures into measurement architectures of smart grids at the design phase is strongly recommended.

Keywords: cyber security, performance, protocols, security standards, smart grid

Procedia PDF Downloads 300
357 The Role of Virtual Reality in Mediating the Vulnerability of Distant Suffering: Distance, Agency, and the Hierarchies of Human Life

Authors: Z. Xu

Abstract:

Immersive virtual reality (VR) has gained momentum in humanitarian communication due to its utopian promises of co-presence, immediacy, and transcendence. These potential benefits have led the United Nations (UN) to tirelessly produce and distribute VR series to evoke global empathy and encourage policymakers, philanthropic business tycoons and citizens around the world to actually do something (i.e. give a donation). However, it is unclear whether or not VR can cultivate cosmopolitans with a sense of social responsibility towards the geographically, socially/culturally and morally mediated misfortune of faraway others. Drawing upon existing works on the mediation of distant suffering, this article constructs an analytical framework to articulate the issue. Applying this framework on a case study of five of the UN’s VR pieces, the article identifies three paradoxes that exist between cyber-utopian and cyber-dystopian narratives. In the “paradox of distance”, VR relies on the notions of “presence” and “storyliving” to implicitly link audiences spatially and temporally to distant suffering, creating global connectivity and reducing perceived distances between audiences and others; yet it also enables audiences to fully occupy the point of view of distant sufferers (creating too close/absolute proximity), which may cause them to feel naive self-righteousness or narcissism with their pleasures and desire, thereby destroying the “proper distance”. In the “paradox of agency”, VR simulates a superficially “real” encounter for visual intimacy, thereby establishing an “audiences–beneficiary” relationship in humanitarian communication; yet in this case the mediated hyperreality is not an authentic reality, and its simulation does not fill the gap between reality and the virtual world. In the “paradox of the hierarchies of human life”, VR enables an audience to experience virtually fundamental “freedom”, epitomizing an attitude of cultural relativism that informs a great deal of contemporary multiculturalism, providing vast possibilities for a more egalitarian representation of distant sufferers; yet it also takes the spectator’s personally empathic feelings as the focus of intervention, rather than structural inequality and political exclusion (an economic and political power relations of viewing). Thus, the audience can potentially remain trapped within the minefield of hegemonic humanitarianism. This study is significant in two respects. First, it advances the turn of digitalization in studies of media and morality in the polymedia milieu; it is motivated by the necessary call for a move beyond traditional technological environments to arrive at a more novel understanding of the asymmetry of power between the safety of spectators and the vulnerability of mediated sufferers. Second, it not only reminds humanitarian journalists and NGOs that they should not rely entirely on the richer news experience or powerful response-ability enabled by VR to gain a “moral bond” with distant sufferers, but also argues that when fully-fledged VR technology is developed, it can serve as a kind of alchemy and should not be underestimated merely as a “bugaboo” of an alarmist philosophical and fictional dystopia.

Keywords: audience, cosmopolitan, distant suffering, virtual reality, humanitarian communication

Procedia PDF Downloads 117
356 Intrusion Detection Based on Graph Oriented Big Data Analytics

Authors: Ahlem Abid, Farah Jemili

Abstract:

Intrusion detection has been the subject of numerous studies in industry and academia, but cyber security analysts always want greater precision and global threat analysis to secure their systems in cyberspace. To improve intrusion detection system, the visualisation of the security events in form of graphs and diagrams is important to improve the accuracy of alerts. In this paper, we propose an approach of an IDS based on cloud computing, big data technique and using a machine learning graph algorithm which can detect in real time different attacks as early as possible. We use the MAWILab intrusion detection dataset . We choose Microsoft Azure as a unified cloud environment to load our dataset on. We implement the k2 algorithm which is a graphical machine learning algorithm to classify attacks. Our system showed a good performance due to the graphical machine learning algorithm and spark structured streaming engine.

Keywords: Apache Spark Streaming, Graph, Intrusion detection, k2 algorithm, Machine Learning, MAWILab, Microsoft Azure Cloud

Procedia PDF Downloads 119
355 FLEX: A Backdoor Detection and Elimination Method in Federated Scenario

Authors: Shuqi Zhang

Abstract:

Federated learning allows users to participate in collaborative model training without sending data to third-party servers, reducing the risk of user data privacy leakage, and is widely used in smart finance and smart healthcare. However, the distributed architecture design of federation learning itself and the existence of secure aggregation protocols make it inherently vulnerable to backdoor attacks. To solve this problem, the federated learning backdoor defense framework FLEX based on group aggregation, cluster analysis, and neuron pruning is proposed, and inter-compatibility with secure aggregation protocols is achieved. The good performance of FLEX is verified by building a horizontal federated learning framework on the CIFAR-10 dataset for experiments, which achieves 98% success rate of backdoor detection and reduces the success rate of backdoor tasks to 0% ~ 10%.

Keywords: federated learning, secure aggregation, backdoor attack, cluster analysis, neuron pruning

Procedia PDF Downloads 74