Search results for: cyber hygiene
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 569

Search results for: cyber hygiene

239 A Framework for Blockchain Vulnerability Detection and Cybersecurity Education

Authors: Hongmei Chi

Abstract:

The Blockchain has become a necessity for many different societal industries and ordinary lives including cryptocurrency technology, supply chain, health care, public safety, education, etc. Therefore, training our future blockchain developers to know blockchain programming vulnerability and I.T. students' cyber security is in high demand. In this work, we propose a framework including learning modules and hands-on labs to guide future I.T. professionals towards developing secure blockchain programming habits and mitigating source code vulnerabilities at the early stages of the software development lifecycle following the concept of Secure Software Development Life Cycle (SSDLC). In this research, our goal is to make blockchain programmers and I.T. students aware of the vulnerabilities of blockchains. In summary, we develop a framework that will (1) improve students' skills and awareness of blockchain source code vulnerabilities, detection tools, and mitigation techniques (2) integrate concepts of blockchain vulnerabilities for IT students, (3) improve future IT workers’ ability to master the concepts of blockchain attacks.

Keywords: software vulnerability detection, hands-on lab, static analysis tools, vulnerabilities, blockchain, active learning

Procedia PDF Downloads 59
238 The Chewing Gum Confectionary Development for Oral Hygiene with Nine Hour Oral Antibacterial Activity

Authors: Yogesh Bacchaw, Ashish Dabade

Abstract:

Nowadays oral health is raising concern in society. Acid producing microorganisms changes the oral pH and creates a favorable environment for microbial growth. This growth not only promotes dental decay but also bad breath. Generally Recognized As Safe (GRAS) listed component was incorporated in chewing gum as an antimicrobial agent. The chewing gum produced exhibited up to 9 hours of antimicrobial activity against oral microflora. The toxicity of GRAS component per RACC value of chewing gum was negligible as compared to actual toxicity level of GRAS component. The antibacterial efficiency of chewing gum was tested by using total plate count (TPC) and colony forming unit (CFU). Nine hours were required to microflora to reach TPC/CFU of before chewing gum consumption. This chewing gum not only provides mouth freshening activity but also helps in lowering dental decay, bad breath, and enamel whitening.

Keywords: colony forming unit (CFU), chewing gum, generally recognized as safe (GRAS), microbial growth, microorganisms, oral health, RACC, total plate count (TPC), antimicrobial agent, enamel whitening, oral pH

Procedia PDF Downloads 279
237 DISGAN: Efficient Generative Adversarial Network-Based Method for Cyber-Intrusion Detection

Authors: Hongyu Chen, Li Jiang

Abstract:

Ubiquitous anomalies endanger the security of our system con- stantly. They may bring irreversible damages to the system and cause leakage of privacy. Thus, it is of vital importance to promptly detect these anomalies. Traditional supervised methods such as Decision Trees and Support Vector Machine (SVM) are used to classify normality and abnormality. However, in some case, the abnormal status are largely rarer than normal status, which leads to decision bias of these methods. Generative adversarial network (GAN) has been proposed to handle the case. With its strong generative ability, it only needs to learn the distribution of normal status, and identify the abnormal status through the gap between it and the learned distribution. Nevertheless, existing GAN-based models are not suitable to process data with discrete values, leading to immense degradation of detection performance. To cope with the discrete features, in this paper, we propose an efficient GAN-based model with specifically-designed loss function. Experiment results show that our model outperforms state-of-the-art models on discrete dataset and remarkably reduce the overhead.

Keywords: GAN, discrete feature, Wasserstein distance, multiple intermediate layers

Procedia PDF Downloads 101
236 Role of Numerical Simulation as a Tool to Enhance Climate Change Adaptation and Resilient Societies: A Case Study from the Philippines

Authors: Pankaj Kumar

Abstract:

Rapid global changes resulted in unfavorable hydrological, ecological, and environmental changes and cumulatively affected natural resources. As a result, the local communities become vulnerable to water stress, poor hygiene, the spread of diseases, food security, etc.. However, the central point for this vulnerability revolves around water resources and the way people interrelate with the hydrological system. Also, most of the efforts to minimize the adverse effect of global changes are centered on the mitigation side. Hence, countries with poor adaptive capacities and poor governance suffer most in case of disasters. However, several transdisciplinary numerical tools are well designed and are capable of answering “what-if questions” through scenario analysis using a system approach. This study has predicted the future water environment in Marikina River in the National Capital Region, Metro Manila of Philippines, using Water Evaluation and Planning (WEAP), an integrated water resource management tool. Obtained results can answer possible adaptation measures along with their associated uncertainties. It also highlighted various challenges for the policy planners to design adaptation countermeasures as well as to track the progress of achieving SDG 6.0.

Keywords: water quality, Philippines, climate change adaptation, hydrological simulation, wastewater management, weap

Procedia PDF Downloads 73
235 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

Authors: Jean Rosemond Dora, Karol Nemoga

Abstract:

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.

Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model

Procedia PDF Downloads 141
234 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping

Authors: Andre Slonopas, Zona Kostic, Warren Thompson

Abstract:

Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.

Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory

Procedia PDF Downloads 163
233 Utilization of Solid Waste Materials to Produce Glass-Ceramic Tiles

Authors: Sonjida Mustafia

Abstract:

Glass-ceramic is a material that contains both the properties of glass and ceramic within. They always contain a residual glassy phase and one or more embedded crystalline phases. Ceramic tiles are very popular in the world because of their high structural strength, low absorption, increased hygiene, and hot and cold insulation. Glass-ceramic materials are used to produce marble-like floor and wall tiles. There are a huge amount of waste materials like rice husk ash (RHA), waste iron, waste glass, and other industrial solid waste in Bangladesh, which can be used to produce glass-ceramic floor and wall tiles. The raw materials (rice husk ash, waste glass, and k-feldspar) are a mixture, and the mixture is melted to form glass frit at 1175°C. The frits are grained to require fine particle size. The powder is moistened in 7-8% water with sodium silicate. The green glass-ceramic tiles were fired at different temperatures (800–1100°C) for a soaking time of 1 hour to form glass-ceramic tiles and to study the sintering-crystallization process. The results reveal that the modulus of rupture increases with increasing sintering temperature and reaches the highest value (95.25Mpa) at 925°C. Glossiness and linear shrinkage increase with increasing temperature.

Keywords: rice husk ash, waste glass, glass-ceramic, modulus of rupture, glossiness, linear shrinkage, micro-structure

Procedia PDF Downloads 59
232 Digital Activism and the Individual: A Utilitarian Perspective

Authors: Tania Mitra

Abstract:

Digital Activism or Cyber Activism uses digital media as a means to disseminate information and mobilize masses towards a specific goal. When digital activism was first born in the early 1990s, it was primarily used by groups of organized political activists. However, with the advent of social media, online activism has filtered down to the individual- one who does not necessarily belong to or identify with an agenda, group, or political party. A large part of digital activism today stems from the individual’s notion of what is right and wrong. This gives rise to a discourse around descriptive ethics and the implications of the independent digital activist. Although digital activism has paved the way for and bolstered support for causes like the MeToo Movement and Black Lives Matter, the lack of a unified, organized body has led to counterintuitive progressions and suspicions regarding the movements. The paper introduces the ideas of 'clout' culture, click baits, and clicktivism (the phenomenon where activism is reduced to a blind following of the online trends), to discuss the impacts of exclusive digital activism. By using Jeremy Bentham's utilitarian approach to ethics, that places emphasis on the best possible outcome for a society, the paper will show how individual online activism reaching for a larger, more common end can sometimes lead to an undermining of that end, not only in the online space but also how it manifests in the real world.

Keywords: digital activism, ethics, independent digital activist, utilitarianism

Procedia PDF Downloads 103
231 The Appropriateness of Antibiotic Prescribing within Dundee Dental Hospital

Authors: Salma Ainine, Colin Ritchie, Tracey McFee

Abstract:

Background: The societal impact of antibiotic resistance is a major public health concern. The increase in the incidence of resistant bacteria can ultimately be fatal. Objective: To analyse the appropriateness of antibiotic prescribing in Dundee Dental Hospital, ultimately improving the safety and quality of patient care. Methods: Two examiners independently cross-checked approximately fifty consecutive prescriptions, and corresponding patient case notes, for three data collection cycles between August 2014–September 2015. The Scottish Dental Clinical Effectiveness Program (SDCEP) Drug Prescribing for Dentistry guidelines was the standard utilised. The criteria: clinical justification, regime justification, and review arrangements was measured, and compared to the standard. Results: Cycle one revealed 42% of antibiotic prescriptions were appropriate. Interventions included: multiple staff meetings, an introduction of a checklist attached to the prescription pack, and production of patient leaflets explaining indications for antibiotics. Cycle two and three revealed 44%, and 30% compliance, respectively. Conclusion: The results of the audit have yet to meet target standards set out in prescribing guidelines. However, steps are being taken and change has occurred on a cultural level.

Keywords: antibiotic resistance, antibiotic stewardship, dental infection, hygiene standards

Procedia PDF Downloads 198
230 Simplifying Health Risk Assessment (HRA) and Its Operationalisation for Turnaround Activities

Authors: Thirumila Muthukamaru

Abstract:

The objective of a Health Risk Assessment (HRA) is to achieve a quality evaluation of risk assessments in a timely manner where adequate controls can be in place to protect workers health, especially during turnarounds where the exposure to health hazards is expected to rise during the performance of the many activities that take place, exposing workers to health risk. HRA development requires a competent team comprising experienced subject matter experts in the field, such as Industrial hygienists, Occupational Health Doctors, Turnaround Coordinators, Operation / Maintenance personnel, etc. The conventional way of conducting HRA is not only tedious and time-consuming but also less appreciated when it is not interpreted correctly, which may contribute to inadequate operationalization of it. Simplification can be the essence of timely intervention in managing health risks. This paper is intended as a sharing of the approach taken to simplify the methodology of developing the HRA report and operationalizing it. The approach includes developing a Generic HRA for turnaround activities to be used as a reference document and the empowerment of identified personnel through upskilling sessions to take up the role of facilitating HRA sessions. This empowerment is one of the key approaches towards the successful translation of the HRA into specific turnaround Job Hazard Analysis (JHA) that embed it in the Permit to Work (PTW) process. The approach used here increases awareness and compliance on HRA for turnaround activities through better interpretation and operationalization of the HRA report, adding value to the risk assessment for turnaround activities.

Keywords: industrial hygiene, health risk assessment, HRA, risk assessment

Procedia PDF Downloads 23
229 Real-Time Network Anomaly Detection Systems Based on Machine-Learning Algorithms

Authors: Zahra Ramezanpanah, Joachim Carvallo, Aurelien Rodriguez

Abstract:

This paper aims to detect anomalies in streaming data using machine learning algorithms. In this regard, we designed two separate pipelines and evaluated the effectiveness of each separately. The first pipeline, based on supervised machine learning methods, consists of two phases. In the first phase, we trained several supervised models using the UNSW-NB15 data-set. We measured the efficiency of each using different performance metrics and selected the best model for the second phase. At the beginning of the second phase, we first, using Argus Server, sniffed a local area network. Several types of attacks were simulated and then sent the sniffed data to a running algorithm at short intervals. This algorithm can display the results of each packet of received data in real-time using the trained model. The second pipeline presented in this paper is based on unsupervised algorithms, in which a Temporal Graph Network (TGN) is used to monitor a local network. The TGN is trained to predict the probability of future states of the network based on its past behavior. Our contribution in this section is introducing an indicator to identify anomalies from these predicted probabilities.

Keywords: temporal graph network, anomaly detection, cyber security, IDS

Procedia PDF Downloads 77
228 Digital Forensics Compute Cluster: A High Speed Distributed Computing Capability for Digital Forensics

Authors: Daniel Gonzales, Zev Winkelman, Trung Tran, Ricardo Sanchez, Dulani Woods, John Hollywood

Abstract:

We have developed a distributed computing capability, Digital Forensics Compute Cluster (DFORC2) to speed up the ingestion and processing of digital evidence that is resident on computer hard drives. DFORC2 parallelizes evidence ingestion and file processing steps. It can be run on a standalone computer cluster or in the Amazon Web Services (AWS) cloud. When running in a virtualized computing environment, its cluster resources can be dynamically scaled up or down using Kubernetes. DFORC2 is an open source project that uses Autopsy, Apache Spark and Kafka, and other open source software packages. It extends the proven open source digital forensics capabilities of Autopsy to compute clusters and cloud architectures, so digital forensics tasks can be accomplished efficiently by a scalable array of cluster compute nodes. In this paper, we describe DFORC2 and compare it with a standalone version of Autopsy when both are used to process evidence from hard drives of different sizes.

Keywords: digital forensics, cloud computing, cyber security, spark, Kubernetes, Kafka

Procedia PDF Downloads 370
227 Gut-Microbiota-Brain-Axis, Leaky Gut, Leaky Brain: Pathophysiology of Second Brain Aging and Alzheimer’s Disease- A Neuroscientific Riddle

Authors: Bilal Ahmad

Abstract:

Alzheimer’s disease (AD) is one of the most common neurodegenerative illnesses. However, how Gut-microbiota plays a role in the pathogenesis of AD is not well elucidated. The purpose of this literature review is to summarize and understand the current findings that may elucidate the gut microbiota's role in the development of AD. Methods: A literature review of all the relevant papers known to the author was conducted. Relevant articles, abstracts and research papers were collected from well-accepted web sources like PubMed, PMC, and Google Scholar. Results: Recent studies have shown that Gut-microbiota has an important role in the progression of AD via Gut-Microbiota-Brain Axis. The onset of AD supports the ‘Hygiene Hypothesis’, which shows that AD might begin in the Gut, causing dysbiosis, which interferes with the intestinal barrier by releasing pro-inflammatory cytokines and making its way up to the brain via the blood-brain barrier (BBB). Molecular mechanisms lipopolysaccharides and serotonin kynurenine (tryptophan) pathways have a direct association with inflammation, the immune system, neurodegeneration, and AD. Conclusion: The studies helped to analyze the molecular basis of AD, other neurological conditions like depression, autism, and Parkinson's disease and how they are linked to Gut-microbiota. Further, studies to explore the therapeutic effects of probiotics in AD and cognitive enhancement should be warranted to provide significant clinical and practical value.

Keywords: gut-microbiota, Alzheimer’s disease, second brain aging, lipopolysaccharides, short-chain fatty acids

Procedia PDF Downloads 19
226 Effect of Environmental Conditions on E. Coli o157:h7 Atcc 43888 and L. Monocytogenes Atcc 7644 Cell Surface Hydrophobicity, Motility and Cell Attachment on Food-Contact Surfaces

Authors: Stanley Dula, Oluwatosini A. Ijabadeniyi

Abstract:

Biofilm formation is a major source of materials and foodstuffs contamination, contributing to occurrence of pathogenic and spoilage microbes in food processing resulting in food spoilage, transmission of diseases and significant food hygiene and safety issues. This study elucidates biofilm formation of E. coli O157:H7 and L. monocytogenes ATCC 7644 grown under food related environmental stress conditions of varying pH (5.0;7.0; and 8.5) and temperature (15, 25 and 37 ℃). Both strains showed confluent biofilm formation at 25 ℃ and 37 ℃, at pH 8.5 after 5 days. E. coli showed curli fimbriae production at various temperatures, while L. monocytogenes did not show pronounced expression. Swarm, swimming and twitching plate assays were used to determine strain motilities. Characterization of cell hydrophobicity was done using the microbial adhesion to hydrocarbons (MATH) assay using n-hexadecane. Both strains showed hydrophilic characteristics as they fell within a < 20 % interval. FT-IR revealed COOH at 1622 cm-1, and a strong absorption band at 3650 cm-1 – 3200 cm-1 indicating the presence of both -OH and -NH groups. Both strains were hydrophilic and could form biofilm at different combinations of temperature and pH. EPS produced in both species proved to be an acidic hetero-polysaccharide.

Keywords: biofilm, pathogens, hydrophobicity, motility

Procedia PDF Downloads 211
225 Diagnostics of Subclinical Mastitis in Dairy Cows

Authors: G. Tanbayeva, Z. Myrzabekov, O. Tagayev, B. Barakhov, M. Tokayeva

Abstract:

Mastitis is widely spread among dairy cows bringing large economic damage resulting in decreased milk yield, deterioration of the milk quality, gastrointestinal tract disorders among young animals, culling of breeding stock, and expenses for sick animal treatment. Up-to-date and accurate diagnostics of subclinical (latent) mastitis in dairy cows has huge practical and economical significance. The aim of the research was to develop a new optimal alternative rapid method for the diagnosis of subclinical mastitis in cows. The study was performed in the laboratory of the Hygiene and Sanitation of Kazakh National Agrarian University. The first stage was to evaluate the different percentages of “Promastit” preparation. It showed that the best diagnostics capacity had 10% dilution. The second stage was to compare “Promastit” with some of the domestic and foreign analogues “Somatic-Test” (Denmark), “MastTest” (Russia), “Mastidin” (Ukraine), “Diagmast” (Kazakhstan). The observation was carried out on 520 dairy cows with subclinical mastitis on farms of Almaty region of Kazakhstan. The effectiveness was checked by milk sedimentation test. Our research tends to show that the diagnostic test "Promastitis" revealed subclinical mastitis in 193 out of 520 lactating cows (37.1% of those examined). At the same time, in the case of using other diagnostic tests, the given index was as follows: 35.5% (mastidin), 34.4% (masttest-AF), 33.8% (somatic-test Ecotest), 30.7% (diagmast).

Keywords: dairy cows, diagnostics, subclinical mastitis, test Promastit

Procedia PDF Downloads 331
224 Analysis of Cyber Activities of Potential Business Customers Using Neo4j Graph Databases

Authors: Suglo Tohari Luri

Abstract:

Data analysis is an important aspect of business performance. With the application of artificial intelligence within databases, selecting a suitable database engine for an application design is also very crucial for business data analysis. The application of business intelligence (BI) software into some relational databases such as Neo4j has proved highly effective in terms of customer data analysis. Yet what remains of great concern is the fact that not all business organizations have the neo4j business intelligence software applications to implement for customer data analysis. Further, those with the BI software lack personnel with the requisite expertise to use it effectively with the neo4j database. The purpose of this research is to demonstrate how the Neo4j program code alone can be applied for the analysis of e-commerce website customer visits. As the neo4j database engine is optimized for handling and managing data relationships with the capability of building high performance and scalable systems to handle connected data nodes, it will ensure that business owners who advertise their products at websites using neo4j as a database are able to determine the number of visitors so as to know which products are visited at routine intervals for the necessary decision making. It will also help in knowing the best customer segments in relation to specific goods so as to place more emphasis on their advertisement on the said websites.

Keywords: data, engine, intelligence, customer, neo4j, database

Procedia PDF Downloads 168
223 Data Modeling and Calibration of In-Line Pultrusion and Laser Ablation Machine Processes

Authors: David F. Nettleton, Christian Wasiak, Jonas Dorissen, David Gillen, Alexandr Tretyak, Elodie Bugnicourt, Alejandro Rosales

Abstract:

In this work, preliminary results are given for the modeling and calibration of two inline processes, pultrusion, and laser ablation, using machine learning techniques. The end product of the processes is the core of a medical guidewire, manufactured to comply with a user specification of diameter and flexibility. An ensemble approach is followed which requires training several models. Two state of the art machine learning algorithms are benchmarked: Kernel Recursive Least Squares (KRLS) and Support Vector Regression (SVR). The final objective is to build a precise digital model of the pultrusion and laser ablation process in order to calibrate the resulting diameter and flexibility of a medical guidewire, which is the end product while taking into account the friction on the forming die. The result is an ensemble of models, whose output is within a strict required tolerance and which covers the required range of diameter and flexibility of the guidewire end product. The modeling and automatic calibration of complex in-line industrial processes is a key aspect of the Industry 4.0 movement for cyber-physical systems.

Keywords: calibration, data modeling, industrial processes, machine learning

Procedia PDF Downloads 256
222 Food Service Waste Management In Nigeria: Emerging Opportunities And Policy Initiatives For Mitigation

Authors: Victor Oyewumi Ogunbiyi

Abstract:

Food waste is recognised as one of the major global challenges in achieving a sustainable future. Currently, very little is known about the multi-stakeholder approach to food waste management downstream of the supply chain, particularly in the foodservice sector. In order to better understand and explain the complex issues of food waste, a qualitative study was conducted on the generation of food waste in food services (restaurants, catering, canteens, and local food vendors) and policy initiatives to mitigate it from the perspective of the stakeholders. A semi-structured interview approach and observation were used to collect data from some 32 selected stakeholders in Garki, Abuja, Nigeria. Thematic analysis was employed to analyse the data from the qualitative instrument adopted in this study. Results revealed that the attitude of stakeholders, poor environmental hygiene, poor food cooking skills and handling, and lack of communication are the major causes of food waste. This study identified seven policy initiatives: regulations, information and education campaigns, economic instruments, mobile applications, stakeholders’ collaboration, firm internal action, and training. Finally, we link policy initiatives to food waste mitigation to provide a response to the damaging shock of food waste.

Keywords: food waste, foodservices, emerging opportunities, policy initiatives, food waste prevention, multistakeholder. garki district-abuja

Procedia PDF Downloads 58
221 Use of a Relief Mobile Unit in the Humanitarian Cause

Authors: Stephani Ferreira da Silva Manso, Regina M. M. Dias Chiquetano

Abstract:

This article aims to present a research on one of the main aspects of response in humanitarian causes: agility of operations. Brazil is among the 10 countries with the highest number of people affected by disasters.The main types of disasters in Brazil include floods and mass movements. Focusing on a nongovernmental organization that began in the conflicts of First and Second World Wars, arriving in Brazil in 1984. In 2017, the organization has activated their emergency response mobile unit to reach families following flooding that affected around 9,000 people. In partnership with Truckvan, the mobile unit, has 45 m² of floor space and is divided into three compartments each designed to meet the main needs of the population: the first will be used to prepare hot meals, the second to washing and drying of clothes, and the third for the accomplishment of psychological support. This option will be available for situations where there are more than one thousand victims who are sheltered, even temporarily, and demand immediate care, which will be identified through the National Emergency Plan. In this way, the actions that were already done as donation of blankets, clothes, hygiene kits, among others, will be enhanced. Studies show that one of the biggest difficulties in responding to the disaster is in the first few hours after the disaster. This study aimed to show the organization's innovative results and to propose improvement actions in transportation focused on humanitarian aid as the concepts developed in the manufacture and adaptation of the mobile unit to the rescue environment. Thus, the principles of this humanitarian aid bus are very effective.

Keywords: disasters, humanitarian cause, relief, unit mobile

Procedia PDF Downloads 161
220 An Efficient Discrete Chaos in Generalized Logistic Maps with Applications in Image Encryption

Authors: Ashish Ashish

Abstract:

In the last few decades, the discrete chaos of difference equations has gained a massive attention of academicians and scholars due to its tremendous applications in each and every branch of science, such as cryptography, traffic control models, secure communications, weather forecasting, and engineering. In this article, a generalized logistic discrete map is established and discrete chaos is reported through period doubling bifurcation, period three orbit and Lyapunov exponent. It is interesting to see that the generalized logistic map exhibits superior chaos due to the presence of an extra degree of freedom of an ordered parameter. The period doubling bifurcation and Lyapunov exponent are demonstrated for some particular values of parameter and the discrete chaos is determined in the sense of Devaney's definition of chaos theoretically as well as numerically. Moreover, the study discusses an extended chaos based image encryption and decryption scheme in cryptography using this novel system. Surprisingly, a larger key space for coding and more sensitive dependence on initial conditions are examined for encryption and decryption of text messages, images and videos which secure the system strongly from external cyber attacks, coding attacks, statistic attacks and differential attacks.

Keywords: chaos, period-doubling, logistic map, Lyapunov exponent, image encryption

Procedia PDF Downloads 118
219 Health Promotion Program on Prevention of Zoonotic Diseases among Aborigines in Peninsular Malaysia

Authors: Siti Fatimah Kader Maideen, Abdul Rashid, Nur Indah Ahmad

Abstract:

Introduction: Indigenous people have an increased risk of contracting zoonotic infections due to their practices. Similarly, the aborigines in Peninsular Malaysia, the Orang Asli, have a higher risk too. This study aimed to empower the Jahai children on the prevention of zoonotic infections by implementing a health promotion intervention program. Methods: A non-experimental pre and post-test interventional study was conducted among the indigenous primary school children aged between nine and 12 years in Perak, Malaysia. A structured questionnaire was used to assess the pre-and post-knowledge and attitudes towards zoonotic infections and hand hygiene practice. This is followed by three sessions of the health promotion program. Ethical approval was obtained prior to the data collection. Data were analysed using SPSS software. Results: The knowledge on whether diseases can spread from animals to humans, transmission via saliva and faeces, types of organisms that can infect, and signs and symptoms increased significantly between pre and post. Significant improvements were observed in the attitude and practices too. Conclusion: The intervention program demonstrated improvement in the knowledge, attitude, and practice among the children. The continuous program needs to be conducted for a sustainable outcome.

Keywords: health promotion, zoonotic infections, aborigines, knowledge, practice

Procedia PDF Downloads 139
218 Platooning Method Using Dynamic Correlation of Destination Vectors in Urban Areas

Authors: Yuya Tanigami, Naoaki Yamanaka, Satoru Okamoto

Abstract:

Economic losses due to delays in traffic congestion regarding urban transportation networks have become a more serious social problem as traffic volume increases. Platooning has recently been attracting attention from many researchers to alleviate traffic jams, especially on the highway. On highways, platooning can have positive effects, such as reducing inter-vehicular distance and reducing air resistance. However, the impacts of platooning on urban roads have not been addressed in detail since traffic lights may break the platoons. In this study, we propose a platooning method using L2 norm and cosine similarity to form a platoon with highly similar routes. Also, we investigate the sorting method within a platoon according to each vehicle’s straightness. Our proposed sorting platoon method, which uses two lanes, eliminates Head of Line Blocking at the intersection and improves throughput at intersections. This paper proposes a cyber-physical system (CPS) approach to collaborative urban platoon control. We conduct simulations using the traffic simulator SUMO and the road network, which imitates Manhattan Island. Results from the SUMO confirmed that our method shortens the average travel time by 10-20%. This paper shows the validity of forming a platoon based on destination vectors and sorting vehicles within a platoon.

Keywords: CPS, platooning, connected car, vector correlation

Procedia PDF Downloads 53
217 Identity Management in Virtual Worlds Based on Biometrics Watermarking

Authors: S. Bader, N. Essoukri Ben Amara

Abstract:

With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates.

Keywords: identity management, security, biometrics authentication and authorization, avatar, virtual world

Procedia PDF Downloads 245
216 The Adverse Effects of Air Pollution on Mental Health in Metropolitans

Authors: Farrin Nayebzadeh, Mohammadreza Eslami Amirabadi

Abstract:

According to technological progress and urban development, the cities of the world are growing to become metropolitans, living in which can be enthusiastic, entertaining and accessibility to the facilities like education, economic factors, hygiene and welfare is high. On the other hand, there are some problems that have been ignored in planning for such high quality of life, most important of which, is human health. Two aspects of human health are physical health and mental health, that are closely associated. Human mental health depends on two important factors: Biological factor and environmental factor. Air pollution is one of the most important environmental risk factors that affects mental health. Psychological and toxic effects of air pollution can lead to psychiatric symptoms, including anxiety and changes in mood, cognition, and behavior, depression and also children's mental disorders like hyperactivity, aggression and agitation. Increased levels of some air pollutants are accompanied by an increase in psychiatric admissions and emergency calls and, in some studies, by changes in behavior and a reduction in psychological well-being. Numerous toxic pollutants interfere with the development and adult functioning of the nervous system. Psychosocial stress can cause symptoms similar to those of organic mental disorders. These factors can cause resonance of psychiatric disorders. So, in cities of developing countries, people challenge with mental health problems due to environmental factors especially air pollution that have not been forecasted in urban planning.

Keywords: air pollution, environmental factors, mental health, psychiatric disorder

Procedia PDF Downloads 470
215 User Selections on Social Network Applications

Authors: C. C. Liang

Abstract:

MSN used to be the most popular application for communicating among social networks, but Facebook chat is now the most popular. Facebook and MSN have similar characteristics, including usefulness, ease-of-use, and a similar function, which is the exchanging of information with friends. Facebook outperforms MSN in both of these areas. However, the adoption of Facebook and abandonment of MSN have occurred for other reasons. Functions can be improved, but users’ willingness to use does not just depend on functionality. Flow status has been established to be crucial to users’ adoption of cyber applications and to affects users’ adoption of software applications. If users experience flow in using software application, they will enjoy using it frequently, and even change their preferred application from an old to this new one. However, no investigation has examined choice behavior related to switching from Facebook to MSN based on a consideration of flow experiences and functions. This investigation discusses the flow experiences and functions of social-networking applications. Flow experience is found to affect perceived ease of use and perceived usefulness; perceived ease of use influences information ex-change with friends, and perceived usefulness; information exchange influences perceived usefulness, but information exchange has no effect on flow experience.

Keywords: consumer behavior, social media, technology acceptance model, flow experience

Procedia PDF Downloads 329
214 Strategies to Combat the Covid-19 Epidemic

Authors: Marziye Hadian, Alireza Jabbari

Abstract:

Background: The World Health Organization has identified COVID-19 as a public health emergency and is urging governments to stop the virus transmission by adopting appropriate policies. In this regard, the countries have taken different approaches to cutting the chain or controlling the spread of the disease. Methods: The present study was a systematize review of publications relating to prevention strategies for covid-19 disease. The study was carried out based on the PRISMA guidelines and CASP for articles and AACODS for grey literature. Finding: The study findings showed that in order to confront the COVID-19 epidemic, in general, there are three approaches of "mitigation", "active control" and "suppression" and four strategies of "quarantine", "isolation", "social distance" as well as "lockdown" in both individual and social dimensions to deal with epidemics that the choice of each approach requires specific strategies and has different effects when it comes to controlling and inhibiting the disease. Conclusion: The only way to control the disease is to change your behavior and lifestyle. In addition to prevention strategies, use of masks, observance of personal hygiene principles such as regular hand washing and non-contact of contaminated hands with the face, as well as observance of public health principles such as control of sneezing and coughing, safe extermination of personal protective equipment, etc. have not been included in the category of prevention tools. However, it has a great impact on controlling the epidemic, especially the new coronavirus epidemic.

Keywords: novel corona virus, COVID-19, prevention tools, prevention strategies

Procedia PDF Downloads 113
213 An Innovative Equipment for ICU Infection Control

Authors: Ankit Agarwal

Abstract:

Background: To develop a fully indigenous equipment which is an innovation in critical care, which can effectively scavenge contaminated ICU ventilator air. Objectives: Infection control in ICUs is a concern the world over. Various modalities from simple hand hygiene to costly antibiotics exist. However, one simple and scientific fact has been unnoticed till date, that the air exhaled by patients harboring MDR and other microorganisms, is released by ventilators into ICU atmosphere itself. This increases infection in ICU atmosphere and poses risk to other patients. Material and Methods: Some parts of the ventilator are neither disposable nor sterilizable. Over time, microorganisms accumulate in ventilator and act as a source of infection and also contaminate ICU air. This was demonstrated by exposing microbiological culture plates to air from expiratory port of ventilator, whereby dense growth of pathogenic microorganisms was observed. The present prototype of the equipment is totally self-made. It has a mechanism of controlled negative pressure, active and passive systems and various alarms and is versatile to be used with any ventilator. Results: This equipment captures the whole of contaminated exhaled air from the expiratory port of the ventilator and directs it out of the ICU space. Thus, it does not allow contaminated ventilator air to release into the ICU atmosphere. Therefore, there is no chance of exposure of other patients to contaminated air. Conclusion: The equipment is first of its kind the world over and is already under patent process. It has rightly been called ICU Ventilator Air Removal System (ICU VARS). It holds a chance that this technique will gain widespread acceptance shall find use in all the ventilators in most of the ICUs throughout the world.

Keywords: innovative, ICU Infection Control, microorganism, negative pressure

Procedia PDF Downloads 330
212 Assessment of Aflatoxins in Marketed Fish: A Potential Forgotten Risk in Cameroon

Authors: Evelyne Nguegwouo, Raoul Fonkem Sonfack Tsakem, Abel Wade, Gabriel Nama Medoua, Kamgaing Theophile

Abstract:

Fresh and smoked fish are widely consumed in Cameroon. The traditional nature of smoking, the lack of hygiene in production, the poor preservation of stocks and the long storage time for certain types of fish considerably favor the contamination of products by molds, which secrete toxic molecules called mycotoxins. Today there are more than 400 types of mycotoxins, Aflatoxins being the most formidable. These toxins are considered carcinogenic in humans. It is in this perspective that we proposed to evaluate the total Aflatoxins in the fish marketed and consumed by the populations of the city of Yaoundé in Cameroon. On the one hand, it was a question of conducting a survey of fish consumers and sellers in points of sale, sampling fish of three species [Marquereau (Scomber scombrus), Cod (Gadus morhua) and Bifaka (Ethmalosa fimbriata)], randomly in some markets of the city to evaluate the total Aflatoxins contents (B1, B2, G1, G2) by the quantitative ELISA method and finally to estimate the level of exposure of the populations. It emerges from this study that of the 30 samples analyzed, 96.1% contained total Aflatoxins and two samples had total Aflatoxins levels above the standard, which is 20 ppb. These first results show that the risk is present in Cameroon and in order to improve the quality of marketed fish in terms of mycotoxins, a more thorough control must be done from the production chain to the consumer.

Keywords: aflatoxins, evaluation, exposure, mycotoxins, fish

Procedia PDF Downloads 47
211 US-ASEAN Counter Terrorism Cooperation: Maintaining International Security and Avoiding Muslim Stereotypes

Authors: Jordan Daud, Satriya Wibawa, Wahyu Wardhana

Abstract:

The US Global War on Terror has had effect on Southeast Asia as Second Front of Global War on Terror. Since 2001, ASEAN had adopted legal framework to counter the terrorist threat through numerous approach which accommodate various counterterrorism policy of the ten member states. ASEAN have also enhanced multilateral cooperation with US and its allies in Asia Pacific region in addressing terrorist threat, terrorist funding, cyber terrorism and other forms of terrorism. This cooperation is essential to maintain international security and stability and also assure economic development. This work focuses on the US-ASEAN counterterrorism cooperation due to they identified terrorism as a mutual enemy that posed to human security, infrastructure security, and national security. Having in mind that international terrorism usually connected with Muslim community, this paper will also elaborate the concept of Jihad and Islam revivalism in politics to avoid negative image of Islam and Muslim. This paper argues that as region with large Muslim community, Southeast Asia still need to tighten counter terrorism cooperation and also lessening Muslim stereotypes with terrorism through educating public understanding and inter-faith and intra-faith dialogue to create a better world.

Keywords: ASEAN, U.S., counter terrorism, Muslim stereotypes

Procedia PDF Downloads 224
210 Assessment of Microbiological Status of Branded and Street Vended Ice-Cream Offered for Public Consumption: A Comparative Study in Tangail Municipality, Bangladesh

Authors: Afroza Khatun, Masuma, Md. Younus Mia, Kamal Kanta Das

Abstract:

Analysis of the microbial status and physicochemical parameters of some branded and street vended ice cream showed that total viable bacteria in branded ice cream ranged from 4.8×10³ to 1.10×10⁵ cfu/ml, and in street vended ice-cream ranged from 7.5×10⁴ to 1.6×10⁸ cfu/ml. Total coliform bacteria present up to 9.20×10³ cfu/ml in branded ice cream and 5.3×10³ to 9.6×10⁶ cfu/ml observed in street vended ice cream. Total E. coli were found to be present within a range from 0 to 4.5×10³ cfu/ml in branded and 4.1×10² to 7.5×10⁴ cfu/ml in street ice cream. The ranges of Staphylococcus aureus count were 1.8×10² to 2.9×10⁴ cfu/ml (branded) and 3.9×10⁴ to 7.9×10⁶ cfu/ml (street). The pH of both types of ice cream showed acidic to neutral conditions where the concentration of pH for branded ice cream was 5.5 to 6.9, as well as the value of pH in street ice cream, was 6.2 to 7.0. The range of Total soluble solids in several branded ice creams was 26 to 29%, and the value of TSS obtained in street-vended ice-creams ranged from 5 to 10%. The overall results of this research demonstrated that the microbial quality in all street ice creams exceeded the BSTI standard and exhibited lower quality than the industrially produced branded ice creams due to comparatively faulty manufacturing processes and poor hygiene practices. The presence of pathogenic microbes was also observed in branded ice creams which was quite alarming for public health. So it is suggested that the government authorized organization should conduct the proper monitoring system to ensure that both branded and street vended ice-creams are microbiologically safe to prevent public health hazards.

Keywords: food safety, microbiological analysis, physicochemical, ice-cream, E. coli, Staphylococcus aureus

Procedia PDF Downloads 56