Search results for: cyber hygiene
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 569

Search results for: cyber hygiene

209 Evaluation Criteria for Performance of Knitted Terry Fabrics and Building Elements of Fashion: A Critical Review

Authors: Harpinder Kaur, Amit Madahar

Abstract:

The terry fabric is one of the fastest growing and challenging sub-sectors of the textile industry. Terry fabrics are produced using ground weft, ground warp, and pile yarns. The terry fabrics not only finds applications in towels but also in home textile products, sauna dressing- gowns, slippers, jackets, garments, apparels, outerwears, overcoats, sweatshirts, children’s clothes, and hygiene products for babies, beachwear, sleepwear, gloves, scarfs, shawls, etc. In some cases, these wide ranges of applications not only demand a high degree of absorption but also necessitate the due consideration for the handle properties of the fabrics. These fabrics are required to be accessed for their performance in terms of absorbency and comfort characteristics. Since material (yarns, colors, fabrics, fashion, patrons, accessories and fittings) are the core elements of structure of fashion, hence textile and fashion go hand in hand. This paper throws some light on the performance evaluation of terry fabrics. Here, characteristics/features that are required to be achieved for satisfactory performance of the terry fabrics with reference to fashion are discussed. The terry fabrics are being modified over the years in terms of the raw material requirements such as 100% cotton or blends or cotton with other fibers in order to obtain better performance as well as their structural parameters including stitch length and stitch density etc.

Keywords: absorbency, comfort, cotton, performance, terry fabrics, fashion

Procedia PDF Downloads 114
208 Second Order Journalism: A Study of Selected Niche Authorities on Facebook and Twitter

Authors: Yvonne Dedzo

Abstract:

Social media has become a powerful tool in bridging the distance between individuals regardless of their location. It has become a convenient platform for public discussion and, consequently, generated the phenomenon of citizen journalists who have become both proactive and reactive participants in the dissemination of news, information and other epochal and historical events. This phenomenon has fueled the growth of niche authorities who deliver exceptional democratically consequential information online. This study, therefore, investigates how some selected niche authorities maintain their status on social media. Using the selective processes theory, the study further interrogates the information shared by niche authorities and further analyses the extent to which a public interest-altruistic motive or personal interest-self-serving motive drives their agenda of new sharing and usage. Through cyber-ethnography and, qualitative content analysis and semi-structured interviews, data was gathered and analysed from the posts of two purposely selected niche authorities on Facebook and Twitter. The findings indicate that niche authorities maintain their status by being consistent, prompt, informative, resourceful and interactive in their postings on the social media platform. The study also discovered that even though niche authorities are motivated by both public interest-altruism and interest-self-serving, the latter had a higher of motivation than the former.

Keywords: social medida, citizen journalist, niche authorities, selective processes theory

Procedia PDF Downloads 39
207 Absence of Secured Bathing Spaces and Its Effect on Women: An Exploratory Qualitative Study of Rural Odisha, India

Authors: Minaj Ranjita Singh, Meghna Mukherjee, Abhijeet Jadhav

Abstract:

This is an exploratory qualitative study with an objective to understand the bathing practices followed by rural women and its consequences. Access to safe bathing spaces in rural India is a neglected issue due to which women are affected in various ways. Today, government policies are largely focused towards the building of toilets, but no importance has been given to the construction of bathrooms. Both qualitative and quantitative data were collected using in-depth interviews and focused group discussions with rural women in six villages of Odisha, India. The study was approved by an Institutional Research and Ethics Committee, and informed consent was taken from participants. For most of the participants, the access to water, bathing space and toilet was compromised posing various challenges in their daily lives. Women's daily schedule, hygiene practices, dignity, and health are greatly affected due to this lack. Since bathing in the open has been an ancient practice, the community's perception is benign towards the hardship of women. Lack of exposure to concealed bathing, necessary funds, and competing priorities are some of the household level factors which never let them think about having bathrooms and the lack of water supply, proper drainage system, subsidy or financial support are the governance and policy related factors which prevent their access to secured bathing spaces.

Keywords: bathrooms, dignity, exploratory, rural, qualitative, women's health, women

Procedia PDF Downloads 157
206 Environmental Exposure Assessment among Refuellers at Brussels South Charleroi Airport

Authors: Mostosi C., Stéphenne J., Kempeneers E.

Abstract:

Introduction: Refuellers from Brussels South Charleroi Airport (BSCA) expressed concerns about the risks involved in handling JET-A1 fuel. The HSE Manager of BSCA, in collaboration with the occupational physician and the industrial hygiene unit of the External Service of Occupational Medicine, decided to assess the toxicological exposure of these workers. Materials and methods: Two measurement methods were used. The first was to assay three types of metabolites in urine to highlight the exposure to xylenes, toluene, and benzene in aircraft fuels. Out of 32 refuellers in the department, 26 participated in the sampling, and 23 samples were exploited. The second method targeted the assessment of environmental exposure to certain potentially hazardous substances that refuellers are likely to breathe in work areas at the airport. It was decided to carry out two ambient air measurement campaigns, using static systems on the one hand and, on the other hand, using individual sensors worn by the refuellers at the level of the respiratory tract. Volatile organic compounds and diesel particles were analyzed. Results: Despite the fears that motivated these analyzes, the overall results showed low levels of exposure, far below the existing limit values, both in air quality and in urinary measurements. Conclusion: These results are comparable to a study carried out in several French airports. The staff could be reassured, and then the medical surveillance was modified by the occupational physician. With the aviation development at BSCA, equipment and methods are evolving. Their exposure will have to be reassessed.

Keywords: refuelling, airport, exposure, fuel, occupational health, air quality

Procedia PDF Downloads 62
205 Empowering Volunteers at Tawanchai Centre for Patients with Cleft Lip and Palate

Authors: Suteera Pradubwong, Darawan Augsornwan, Pornpen Pathumwiwathana, Benjamas Prathanee, Bowornsilp Chowchuen

Abstract:

Background: Cleft lip and palate (CLP) congenital anomalies have a high prevalence in the Northeast of Thailand. A care team’s understand of treatment plan would help to guide the family of patients with CLP to achieve the treatment. Objectives: To examine the impact of the empowering volunteer project, established in the northeast Thailand. Materials and Methods: The Empowering Volunteer project was conducted in 2008 under the Tawanchai Royal Granted project. The patients and family’s general information, treatment, the group brainstorming, and satisfaction with the project were analyzed. Results: Participants were 12 children with CLP, their families and five volunteers with CLP; the participating patients were predominantly females and the mean, age was 12.2 years. The treatment comprised of speech training, dental hygiene care, bone graft and orthodontic treatment. Four issues were addressed including: problems in taking care of breast feeding; instructions’ needs for care at birth; difficulty in access information and society impact; and needs in having a network of volunteers. Conclusions: Empowering volunteer is important for holistic care of patients with CLP which provides easy access and multiple channels for patients and their families. It should be developed as part of the self-help and family support group, the development of community based team and comprehensive CLP care program.

Keywords: self-help and family support group, community based model, volunteer, cleft lip-cleft palate

Procedia PDF Downloads 259
204 The Role of the Defense and Future War in Ukraine

Authors: Matthew J. Flynn

Abstract:

In early 2022, a thirty-mile column of Russian armor and assault vehicles sat poised to move south on the road to Kiev. That force has withdrawn as the Russians concentrate on attacking eastern Ukraine. Vladimir Putin’s armies appear content to destroy cities in an effort to attrit the Ukrainian will to continue fighting. That pivot signifies the acceptance of the ascendancy of the defense that now dictates any battlefield world-wide. To defeat what military theorist Carl von Clausewitz labeled “the stronger form of war” with a successful offensive requires an exercise in future war. In the past, the ascendancy of the defense has been overcome by a number of things including the application of superior leadership, better technology, organizational adaptation, and surpassing environmental limitations. A look at how each of these factors came to impact battle can tell us a great deal about what Ukraine means to tomorrow’s fight, and where the focus should lie to win the next war. Civilians presently secure the defensive ascendancy impacting warfare by dominating the shifts from domain to domain thanks to controlling access to cyberspace. That mandate will be tested and eventually falter. This paper tests the desirability of that proposition, as well as hoping for something more from humanity other than repeated and frequent wars making future war look much like past wars. As nations struggle to control cyberspace, a referendum on war as part of the human condition comes into focus.

Keywords: cyber, domains, future war, Putin, Ukraine

Procedia PDF Downloads 81
203 Does One Size Fit All: Immigrant Youths, Bullying and Peer-Aggression

Authors: Shila Khayambashi

Abstract:

For the past few decades, Western researchers studied different youth issues, such as bullying, peer-aggression, depression, self-harm, and suicide, in a formulated and standardized manner. These researchers have grounded their studies upon a series of introduced characteristics and traits, which pragmatically defined the action of the individuals involved in these activities (Olweus, 1994). The phenomena of bullying and peer-aggression have touched the lives of many immigrant youths, as well. However, in the case of these immigrant young adults, the Police investigated, and later dismissed, the victims’ involvement in drugs and gangs’ activities, instead of questioning the possibility of the peer-aggression. This paper argues that neither government officials nor school personnel has ever investigated any cyber-documentation which would clarify these youth’s untimely deaths or search for any indication of peer-aggression at school. Through my ongoing research, I will problematize the Eurocentric definition of bullying and its limitations. I question the assumed universality of these definitions’ characteristics and their lack of minority representation. This research questions explicitly the positionality of the displaced youth within the promised multiculturality of Canada. I will ask: Does one size fit all, considering the bio-psycho-socio-economic differences between the Eastern and the Western worlds? More importantly, how does the epidemy of the communicative devices, like smartphones, and communicative apps, like Twitter and Snapchats, facilitate or hinder peer-aggression for the displaced youths?

Keywords: Bullying , Immigrant youths, Peer aggression, Minority population

Procedia PDF Downloads 113
202 Hypertension and Its Association with Oral Health Status in Adults: A Pilot Study in Padusunan Adults Community

Authors: Murniwati, Nurul Khairiyah, Putri Ovieza Maizar

Abstract:

The association between general and oral health is clearly important, particularly in adults with medical conditions. Many of the medical systemic conditions are either caused or aggravated by poor oral hygiene and vice versa. Hypertension is one of common medical systemic problem which has been a public health concern worldwide due to its known consequences. Those consequences must be related to oral health status as well, whether it may cause or worsen the oral health conditions. The objective of this study was to find out the association between hypertension and oral health status in adults. This study was an analytical observational study by using cross-sectional method. A total of 42 adults both male and female in Padusunan Village, Pariaman, West Sumatra, Indonesia were selected as subjects by using purposive sampling. Manual sphygmomanometer was used to measure blood pressure and dental examination was performed to calculate the decayed, missing, and filled teeth (DMFT) scores in order to represent oral health status. The data obtained was analyzed statistically using One Way ANOVA to determine the association between hypertensive adults and their oral health status. The result showed that majority age of the subjects was ranging from 51-70 years (40.5%). Based on blood pressure examination, 57.1% of subjects were classified to prehypertension. Overall, the mean of DMFT score calculated in normal, prehypertension and hypertension group was not considered statistically significant. There was no significant association (p>0.05) between hypertension and oral health status in adults.

Keywords: blood pressure, hypertension, DMFT, oral health status

Procedia PDF Downloads 297
201 Explaining the Changes in Contentious Politics of China: A Comparative Study of Falun Gong and 'Diaosi'

Authors: Larry Lai, Evans Leung

Abstract:

Falun gong is a self-proclaimed religious group that has been under crackdown by Beijing for more than two decades. Diaosi, on the other hand, is an emerging community with members loosely connected on the internet through different online social platforms, centering around the sharing of different hobbies and interests. Diaosi community has been transformed from a potential threat to the Chinese authority for different causes to a pro-government force. This paper seeks to explain the different strategies adopted by the People's Republic of China (PRC) regime in handling these two potential threatening communities. Both communities share some obvious similarities: (1) both have massive nation-wide participation; (2) both have attempted to challenge the PRC's authority through contentious means; (3) both have high level of mobility, online or offline; and (4) both have at first been unnoticed until the threat against the PRC have taken form. But the strategies the PRC endorsed against the communities were, in many ways, different. The question is: if the strategy against Falun Gong has been an effective one, why used other strategies against Diaosi? The authors argue that the main reason for using different strategies lies in the differences between the two communities in terms of (i) the nature of the groups, and (ii) the group dynamics. Lastly, based on this analysis, the authors attempt to explore the possible strategies that the PRC would adopt against the Hong Kong cyber-world political community in light of the latest national security law in Hong Kong.

Keywords: contentious politics, Diaosi, Falun Gong, Hong Kong, People's Republic of China

Procedia PDF Downloads 121
200 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification

Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang

Abstract:

One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.

Keywords: malware detection, network security, targeted attack, computational intelligence

Procedia PDF Downloads 233
199 Assessing the Sheltering Response in the Middle East: Studying Syrian Camps in Jordan

Authors: Lara A. Alshawawreh, R. Sean Smith, John B. Wood

Abstract:

This study focuses on the sheltering response in the Middle East, specifically through reviewing two Syrian refugee camps in Jordan, involving Zaatari and Azraq. Zaatari camp involved the rapid deployment of tents and shelters over a very short period of time and Azraq was purpose built and pre-planned over a longer period. At present, both camps collectively host more than 133,000 occupants. Field visits were taken to both camps and the main issues and problems in the sheltering response were highlighted through focus group discussions with camp occupants and inspection of shelter habitats. This provided both subjective and objective research data sources. While every case has its own significance and deployment to meet humanitarian needs, there are some common requirements irrespective of geographical region. The results suggest that there is a gap in the suitability of the required habitat needs and what has been provided. It is recommended that the global international response and support could be improved in relation to the habitat form, construction type, layout, function and critically the cultural aspects. Services, health and hygiene are key elements to the shelter habitat provision. The study also identified the amendments to shelters undertaken by the beneficiaries providing insight into their key main requirements. The outcomes from this study could provide an important learning opportunity to develop improved habitat response for future shelters.

Keywords: culture, post-disaster, refugees, shelters

Procedia PDF Downloads 461
198 A Study on Compromised Periodontal Health Status among the Pregnant Woman of Jamshedpur, Jharkhand, India

Authors: Rana Praween Kumar

Abstract:

Preterm-low birth weight delivery is a major cause of infant morbidity and mortality in developing countries and has been linked to poor periodontal health during pregnancy. Gingivitis and chronic periodontitis are highly prevalent chronic inflammatory oral diseases. The detection and diagnosis of these common diseases is a fundamentally important component of oral health care. This study is intended to investigate predisposing and enabling factors as determinants of oral health indicators in pregnancy as well as the association between periodontal problems during pregnancy with age and socio economic status of the individual. A community –based prospective cohort study will be conducted in Jamshedpur, Jharkhand, India among pregnant women using completed interviews and a full mouth oral clinical examination using the CPITN (Community Periodontal Index of Treatment Need) and OHI-S (Simplified Oral Hygiene) indices with adequate sample size and informed consent to the patient following proper inclusion and exclusion criteria. Multiple logistic regression analyses will be used to identify independent determinants of periodontal problems and use of dental services during pregnancy. Analysis of covariance (ANCOVA) will be used to investigate the relationship between periodontal problems with the age and socioeconomic status. The result will help in proper monitoring of periodontal health during pregnancy encouraging the delivery of healthy child and the maintenance of proper health of the mother.

Keywords: infant, periodontal problems, pregnancy, pre-term-low birth weight delivery

Procedia PDF Downloads 129
197 Filtering Intrusion Detection Alarms Using Ant Clustering Approach

Authors: Ghodhbani Salah, Jemili Farah

Abstract:

With the growth of cyber attacks, information safety has become an important issue all over the world. Many firms rely on security technologies such as intrusion detection systems (IDSs) to manage information technology security risks. IDSs are considered to be the last line of defense to secure a network and play a very important role in detecting large number of attacks. However the main problem with today’s most popular commercial IDSs is generating high volume of alerts and huge number of false positives. This drawback has become the main motivation for many research papers in IDS area. Hence, in this paper we present a data mining technique to assist network administrators to analyze and reduce false positive alarms that are produced by an IDS and increase detection accuracy. Our data mining technique is unsupervised clustering method based on hybrid ANT algorithm. This algorithm discovers clusters of intruders’ behavior without prior knowledge of a possible number of classes, then we apply K-means algorithm to improve the convergence of the ANT clustering. Experimental results on real dataset show that our proposed approach is efficient with high detection rate and low false alarm rate.

Keywords: intrusion detection system, alarm filtering, ANT class, ant clustering, intruders’ behaviors, false alarms

Procedia PDF Downloads 381
196 A Framework for Event-Based Monitoring of Business Processes in the Supply Chain Management of Industry 4.0

Authors: Johannes Atug, Andreas Radke, Mitchell Tseng, Gunther Reinhart

Abstract:

In modern supply chains, large numbers of SKU (Stock-Keeping-Unit) need to be timely managed, and any delays in noticing disruptions of items often limit the ability to defer the impact on customer order fulfillment. However, in supply chains of IoT-connected enterprises, the ERP (Enterprise-Resource-Planning), the MES (Manufacturing-Execution-System) and the SCADA (Supervisory-Control-and-Data-Acquisition) systems generate large amounts of data, which generally glean much earlier notice of deviations in the business process steps. That is, analyzing these streams of data with process mining techniques allows the monitoring of the supply chain business processes and thus identification of items that deviate from the standard order fulfillment process. In this paper, a framework to enable event-based SCM (Supply-Chain-Management) processes including an overview of core enabling technologies are presented, which is based on the RAMI (Reference-Architecture-Model for Industrie 4.0) architecture. The application of this framework in the industry is presented, and implications for SCM in industry 4.0 and further research are outlined.

Keywords: cyber-physical production systems, event-based monitoring, supply chain management, RAMI (Reference-Architecture-Model for Industrie 4.0)

Procedia PDF Downloads 206
195 A Review on Factors Influencing Implementation of Secure Software Development Practices

Authors: Sri Lakshmi Kanniah, Mohd Naz’ri Mahrin

Abstract:

More and more businesses and services are depending on software to run their daily operations and business services. At the same time, cyber-attacks are becoming more covert and sophisticated, posing threats to software. Vulnerabilities exist in the software due to the lack of security practices during the phases of software development. Implementation of secure software development practices can improve the resistance to attacks. Many methods, models and standards for secure software development have been developed. However, despite the efforts, they still come up against difficulties in their deployment and the processes are not institutionalized. There is a set of factors that influence the successful deployment of secure software development processes. In this study, the methodology and results from a systematic literature review of factors influencing the implementation of secure software development practices is described. A total of 44 primary studies were analysed as a result of the systematic review. As a result of the study, a list of twenty factors has been identified. Some of factors that affect implementation of secure software development practices are: Involvement of the security expert, integration between security and development team, developer’s skill and expertise, development time and communication between stakeholders. The factors were further classified into four categories which are institutional context, people and action, project content and system development process. The results obtained show that it is important to take into account organizational, technical and people issues in order to implement secure software development initiatives.

Keywords: secure software development, software development, software security, systematic literature review

Procedia PDF Downloads 342
194 Theoretical Approach and Proof of Concept Implementation of Adaptive Partition Scheduling Module for Linux

Authors: Desislav Andreev, Veselin Stanev

Abstract:

Linux operating system continues to gain popularity with every passed year. This is due to its open-source license and a great number of distributions, covering users’ needs. At first glance it seems that Linux can be integrated in every type of systems – it is already present in personal computers, smartphones and even in some embedded systems like Raspberry Pi. However, Linux still does not meet the performance and security requirements to run effectively on a real-time system. Real-time systems are very time-restricted – their processes have to execute and finish at strict time intervals. The Completely Fair Scheduler present in Linux does not have such scheduling capabilities and it is not able to ensure that critical-time processes will execute on time. One of the ways to solve this problem is implementing an Adaptive Partition Scheduler solution similar to that present in QNX Neutrino operating system. This type of scheduling divides the CPU in multiple adaptive partitions where each partition holds a percentage of CPU usage called budget, which allows optimal usage of the CPU resources and also provides protection against cyber attacks such as Denial of Service. This approach will also benefit systems, where functional safety is highly demanded, such as the instrumental clusters in the Automotive industry. The purpose of this paper is to present a concept of Adaptive Partition Scheduler designed for Linux-based operating systems.

Keywords: adaptive partitions, Linux kernel modules, real-time systems, scheduling

Procedia PDF Downloads 74
193 Design of an Ensemble Learning Behavior Anomaly Detection Framework

Authors: Abdoulaye Diop, Nahid Emad, Thierry Winter, Mohamed Hilia

Abstract:

Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy.

Keywords: cybersecurity, data protection, access control, insider threat, user behavior analysis, ensemble learning, high performance computing

Procedia PDF Downloads 102
192 Epidemiological Profile of Acute Respiratory Infections Hospitalized in Infants and Children Under 15 Years of Age, Hospital Immaculée, Cayes, Haiti, 2019-2021

Authors: Edna Ariste, Richard Standy Coqmar

Abstract:

Background: Acute respiratory infections are a major public health problem in the world, mainly in vulnerable populations such as newborns, children under five years of age, and the elderly. The objective of this study was to Characterize the cases of acute respiratory infections in infants and under 15 years old hospitalized at the Immaculée Conception Hospital in Cayes from January 1, 2019, to December 31, 2021. Methods: A retrospective descriptive study was conducted on the epidemiology profile of acute respiratory infections hospitalized in the pediatric ward at Immaculée Conception Hospital in Les Cayes from January 2019 to December 2021. The study population consisted of all newborns, infants, and children under 15 years of age diagnosed with respiratory infections at the pediatric service. Data were collected from the hospitalization registers and patient records of this unit. A database was created and used for data collection. Excel and Epi info 7.2 were used for data analysis. Results: A total of 588 cases were identified during the 2019-2021 year. 43.5% (256) were female, and 56.5% (332) were male. The average age was 4, 3. The most affected age group was 1-4 years. The male/female sex ratio was 1.2. The most frequent respiratory infections were respectively pneumonia 44.9%, bronchitis 16.5%, and respiratory distress 10.5%. The mortality rate recorded during this period was 4.4%. Conclusion: Acute respiratory infections are more frequent in young children. It is, therefore, necessary to practice hand hygiene. Reinforce the surveillance of severe acute respiratory infections.

Keywords: acute respiratory infections, pediatrics, cayes, haiti

Procedia PDF Downloads 51
191 The Impact of Cybercrime on Youth Development in Nigeria

Authors: Christiana Ebobo

Abstract:

Cybercrime consists of numerous crimes that are perpetrated on the internet on daily basis. The forms include but not limited to Identity theft, Pretentious dating, Desktop counterfeiting, Internet chat room, Cyber harassment, Fraudulent electronic mails, Automated Teller Machine Spoofing, Pornography, Piracy, Hacking, Credit card frauds, Phishing and Spamming. The general term used among the youths for this type of crime in Nigeria is ‘Yahoo Yahoo’. Cybercrime is on the increase among the youths at all levels as such this study aims at examining the impact of cybercrime on youth development in Nigeria. The study examines the impact of cybercrime on youths’ academic performance, integrity, employment and religious practices. The study is a survey which made use of questionnaire and focus group discussion among 150 randomly selected youths in Gwagwalada LCDA, Federal Capital Territory, Nigeria. The study adopts the systems theory as its theoretical framework. The study also adopts the simple frequency table and percentage for its data analysis. The study reveals that cybercrime has eaten deep into the minds of some youths and some of them are practicing diabolic means to succeed in it. It is also reveals that majority (68%) of the respondents believe that cybercrime impacts negatively on youths’ academic performance in Nigeria. The major recommendation of this study is that cybercrime offenders should be treated like armed robbers in order to discourage other youths from getting involved in it.

Keywords: armed robber, cybercrime, integrity, youth

Procedia PDF Downloads 476
190 A Novel Approach for the Analysis of Ground Water Quality by Using Classification Rules and Water Quality Index

Authors: Kamakshaiah Kolli, R. Seshadri

Abstract:

Water is a key resource in all economic activities ranging from agriculture to industry. Only a tiny fraction of the planet's abundant water is available to us as fresh water. Assessment of water quality has always been paramount in the field of environmental quality management. It is the foundation for health, hygiene, progress and prosperity. With ever increasing pressure of human population, there is severe stress on water resources. Therefore efficient water management is essential to civil society for betterment of quality of life. The present study emphasizes on the groundwater quality, sources of ground water contamination, variation of groundwater quality and its spatial distribution. The bases for groundwater quality assessment are groundwater bodies and representative monitoring network enabling determination of chemical status of groundwater body. For this study, water samples were collected from various areas of the entire corporation area of Guntur. Water is required for all living organisms of which 1.7% is available as ground water. Water has no calories or any nutrients, but essential for various metabolic activities in our body. Chemical and physical parameters can be tested for identifying the portability of ground water. Electrical conductivity, pH, alkalinity, Total Alkalinity, TDS, Calcium, Magnesium, Sodium, Potassium, Chloride, and Sulphate of the ground water from Guntur district: Different areas of the District were analyzed. Our aim is to check, if the ground water from the above areas are potable or not. As multivariate are present, Data mining technique using JRIP rules was employed for classifying the ground water.

Keywords: groundwater, water quality standards, potability, data mining, JRIP, PCA, classification

Procedia PDF Downloads 405
189 Off-Policy Q-learning Technique for Intrusion Response in Network Security

Authors: Zheni S. Stefanova, Kandethody M. Ramachandran

Abstract:

With the increasing dependency on our computer devices, we face the necessity of adequate, efficient and effective mechanisms, for protecting our network. There are two main problems that Intrusion Detection Systems (IDS) attempt to solve. 1) To detect the attack, by analyzing the incoming traffic and inspect the network (intrusion detection). 2) To produce a prompt response when the attack occurs (intrusion prevention). It is critical creating an Intrusion detection model that will detect a breach in the system on time and also challenging making it provide an automatic and with an acceptable delay response at every single stage of the monitoring process. We cannot afford to adopt security measures with a high exploiting computational power, and we are not able to accept a mechanism that will react with a delay. In this paper, we will propose an intrusion response mechanism that is based on artificial intelligence, and more precisely, reinforcement learning techniques (RLT). The RLT will help us to create a decision agent, who will control the process of interacting with the undetermined environment. The goal is to find an optimal policy, which will represent the intrusion response, therefore, to solve the Reinforcement learning problem, using a Q-learning approach. Our agent will produce an optimal immediate response, in the process of evaluating the network traffic.This Q-learning approach will establish the balance between exploration and exploitation and provide a unique, self-learning and strategic artificial intelligence response mechanism for IDS.

Keywords: cyber security, intrusion prevention, optimal policy, Q-learning

Procedia PDF Downloads 206
188 Mental Illness on Youtube: Exploring Identity Performance in the Virtual Space

Authors: P. Saee, Baiju Gopal

Abstract:

YouTube has seen a surge in the recent years in the number of creators opening up about their mental illness on the video-sharing platform. In documenting their mental health, YouTubers perform an identity of their mental illness in the online world. Identity performance is a theory under identity research that has been readily applied to illness narratives and internet studies. Furthermore, in India, suffering from mental illnesses is regarded with stigma, making the act of taking mental health from a personal to a public space on YouTube a phenomenon worth exploring. Thus, the aim of this paper is to analyse the mental illness narratives of Indian YouTubers for understanding its performance in the virtual world. For this purpose, thematic narrative analysis on the interviews of four Indian YouTubers was conducted. This data was synthesized with analysis of the videos the YouTubers had uploaded on their channel sharing about their mental illness. The narratives of the participants shed light on two significant presentations that they engage in: (a) the identity of a survivor/fighter and (b) the identity of a silent sufferer. Further, the participants used metaphors to describe their illness, thereby co-constructing a corresponding identity based on their particular metaphors. Lastly, the process of bringing mental illness from back stage to front stage on YouTube involves a shift in the audience, from being rejecting and invalidating in real life to being supportive and encouraging in the virtual space. Limitations and implications for future research were outlined.

Keywords: cyber-psychology, internet, media, mental health, mental illness, technology

Procedia PDF Downloads 148
187 Media Diplomacy in the Age of Social Networks towards a Conceptual Framework for Understanding Diplomatic Cyber Engagement

Authors: Mohamamd Ayish

Abstract:

This study addresses media diplomacy as an integral component of public diplomacy which emerged in the United States in the post-World War II era and found applications in other countries around the world. The study seeks to evolve a conceptual framework for understanding the practice of public diplomacy through social networks, often referred to as social engagement diplomacy. This form of diplomacy is considered far more ahead of the other two forms associated with both government controlled and independent media. The cases of the Voice of America Arabic Service and the 1977 CBS interviews with the late Egyptian President Anwar Sadat and Israeli Prime Minister Menachem Begin are cited in this study as reflecting the two traditional models. The new social engagement model sees public diplomacy as an act of communication that seeks to effect changes in target audiences through a process of persuasion shaped by discourse orientations and technological features. The proposed conceptual framework for social, diplomatic engagement draws on an open communication environment, an empowered audience, an interactive and symmetrical process of communication, multimedia-based flows of information, direct and credible feedback, distortion and high risk. The writer believes this study would be helpful in providing appropriate knowledge pertaining to our understanding of social diplomacy and furnishing concrete insights into how diplomats could harness virtual space to maximize their goals in the global environment.

Keywords: diplomacy, engagement, social, globalization

Procedia PDF Downloads 254
186 Disaster and Crisis Management Using Geographical Information System (GIS) during the Operation and Maintenance Stages of the Hyderabad Metro Rail in India

Authors: Sai Rajeev Reddy, Ishita Roy, M. Anji Reddy

Abstract:

The paper describes the importance of preventive measures and immediate Emergency logistics during accidents and unfortunate Disasters for the Hyderabad Metro Rails in their various stages of construction. This is the need of the modern generation where accidents, explosions, attacks and sudden crisis are frequent casualties which take huge tolls of life in the present world. The paper utilizes the workflow and application of Geographical information System (GIS) to provide information about problems and crisis structures for efficient Metro Transportation in the city. The study analyzes the difficulties and problems which cause accidents during operation and maintenance stages of the Metro Rail. The paper focuses upon the intermediate and firsthand information of Crisis with the help of GIS technology to share Disaster data for effective measures by the Cyber Police stations, Emergency Responders, Hospitals and First Aid Centre to act immediately and save lives. The results and conclusions have nevertheless proved very informative and useful for the safety board authorities of the Hyderabad Metro Rail. The operation and Maintenance are integral stages in the development of any Multipurpose transportation Projects and are usually prone to various Disasters and tragedies. Hence, the GIS technologies help in distribution of information among the masses with the web Technologies and advanced software developed to prevent and manage crisis widely and in a cost-benefits manner.

Keywords: Geographical Information System, emergency assessment, accident zones, surveillance

Procedia PDF Downloads 539
185 The Rise of Darknet: A Call for Understanding Online Communication of Terrorist Groups in Indonesia

Authors: Aulia Dwi Nastiti

Abstract:

A number of studies and reports on terrorism have continuously addressed the role of internet and online activism to support terrorist and extremist groups. In particular, they stress on social media’s usage that generally serves for the terrorist’s propaganda as well as justification of their causes. While those analyses are important to understand how social media is a vital tool for global network terrorism, they are inadequate to explain the online communication patterns that enable terrorism acts. Beyond apparent online narratives, there is a deep cyber sphere where the very vein of terrorism movement lies. That is a hidden space in the internet called ‘darknet’. Recent investigations, particularly in Middle Eastern context, have shed some lights that this invisible space in the internet is fundamental to maintain the terrorist activities. Despite that, limited number of research examines darknet within the issue of terrorist movements in Indonesian context—where the country is considered quite a hotbed for extremist groups. Therefore, this paper attempts to provide an insight of darknet operation in Indonesian cases. By exploring how the darknet is used by the Indonesian-based extremist groups, this paper maps out communication patterns of terrorist groups on the internet which appear as an intermingled network. It shows the usage of internet is differentiated in different level of anonymity for distinctive purposes. This paper further argues that the emerging terrorist communication network calls for a more comprehensive counterterrorism strategy on the Internet.

Keywords: communication pattern, counterterrorism, darknet, extremist groups, terrorism

Procedia PDF Downloads 268
184 Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison between Central Processing Unit vs. Graphics Processing Unit Functions for Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar

Abstract:

Neural network approaches are machine learning methods used in many domains, such as healthcare and cyber security. Neural networks are mostly known for dealing with image datasets. While training with the images, several fundamental mathematical operations are carried out in the Neural Network. The operation includes a number of algebraic and mathematical functions, including derivative, convolution, and matrix inversion and transposition. Such operations require higher processing power than is typically needed for computer usage. Central Processing Unit (CPU) is not appropriate for a large image size of the dataset as it is built with serial processing. While Graphics Processing Unit (GPU) has parallel processing capabilities and, therefore, has higher speed. This paper uses advanced Neural Network techniques such as VGG16, Resnet50, Densenet, Inceptionv3, Xception, Mobilenet, XGBOOST-VGG16, and our proposed models to compare CPU and GPU resources. A system for classifying autism disease using face images of an autistic and non-autistic child was used to compare performance during testing. We used evaluation matrices such as Accuracy, F1 score, Precision, Recall, and Execution time. It has been observed that GPU runs faster than the CPU in all tests performed. Moreover, the performance of the Neural Network models in terms of accuracy increases on GPU compared to CPU.

Keywords: autism disease, neural network, CPU, GPU, transfer learning

Procedia PDF Downloads 86
183 Factors Influencing Accidental Cyberbullying on Social Media: Healthcare Industry Perspective

Authors: Iram Malik, Mahrukh Shaukat, Abeer Malik, Hafiz Mushtaq Ahmad

Abstract:

There has been a lot of research on cyberbullying but there is limited research on the topic of accidental cyberbullying on social media with a special focus on healthcare industry. This study emphasizes to uncover the factors that contribute to accidental cyberbullying on social media and how it affects individuals, professionals’ and organizations in health care sector. Nowadays social media is becoming a necessary part of our daily life; there is a need to look into how it is shaping our social life and behaviors displayed online. Instances of cyber bullying can have long-term repercussions due to over-sharing of information. The study used simple random sampling and the instrument of data collection was survey. A sample size of 250 healthcare professionals was chosen from the twin cities of Rawalpindi and Islamabad, Pakistan to examine the relationship between their attitude towards internet use, psychological distress, verbal aggression, envy, frustration, self-compassion, personality traits and accidental cyberbullying on social media. The results of the study have been encouraging. The findings show that psychological distress, aggression, envy, frustration and personality traits had direct effect on accidental cyberbullying whereas compassion, altruism lessened the effect of accidental cyberbullying behavior. It is our intent that the findings of this study could help raise awareness regarding fair use of social media, help policy makers in developing appropriate policies for avoiding cyberbullying in future.

Keywords: accidental cyberbullying, aggression, cyberbullying, frustration, social media

Procedia PDF Downloads 263
182 Aggression, Satisfaction and Online Rant Engagement of College Students in General Santos City

Authors: Amanda Andrea Beatrix Brita, Dominic J. Buenaventura, Charmaine A. Seromines, Antonne Noel V. Chua, Ma. Luisa G. Badilles

Abstract:

Online ranting, or the act of forcefully expressing your opinion towards other people over the Internet, has been an ongoing issue ever since the creation of the Internet. Due to the COVID-19 pandemic, the rise of active users has been observed to have increased during this time, thus increasing the number of people being engaged in online activities, which consequently affects the number of individuals who participate in online ranting. However, with all that is observed, what is usually not a topic being discussed about this event are the motivations that lead people to do online ranting. The study was undertaken to discover the level of aggression, Satisfaction, and online engagement in their environment. We utilized 2 researcher-made questionnaires that were validated by three experts, namely for the Satisfaction and engagement levels. We adapted Cyber-Aggression Typology Questionnaire (CATQ) for the level of aggression. Quota sampling was used in determining the respondents. A quota of 250 students was recommended. The results showed that the students in every institution have a deficient level of aggression, and the majority of the institution has a shallow level of Satisfaction when it comes to online ranting. Similar findings are presented in the level of engagement; 2 out of 3 of the institution students have shallow engagement in the general settings that expound students' engagement. Although the result shows deficient levels, there are still instances and possibilities that students may still engage in an online rant regarding various circumstances when triggered. Researchers assumed that there are restrictions on movements likely to show opinions online because of consequences.

Keywords: aggression, satisfaction, online rant engagement, online rant

Procedia PDF Downloads 51
181 Epidemiological-Anatomopathological-Immunohistochemical Profile of Gastric Cancer throughout Eastern Algeria

Authors: S. Tebibel, R. L. Bouchouka, C. Mechati, S. Messaoudi

Abstract:

The stomach cancer or gastric cancer is an aggressive cancer with a significant geographic disparity. The decrease in frequency is attributed to refrigeration, which has several beneficial consequences, increased consumption of fresh fruits and vegetables, reduced consumption of salt, which was widely used as a food preservative, and less contamination of food by carcinogenic compounds. The infection with Helicobacter pylori is responsible for progressive inflammatory changes in the gastric mucosa usually evolving into stomach cancer in 80% of cases. Methodology: This epidemiological and analytical study concerns 65 patients (46 men and 19 women) with gastric adenocarcinomas with an average age of 56.5 years and a male predominance with a sex ratio of 2.4. Results and Discussion: In this series, the clinical symptoms are dominated by epigastralgia (72.31%), vomiting (27,69%), and slimming (24,62%). The FOGD (Oeso-Gastro Duodenal Fibroscopy) performed in the 65 patients revealed a predominance of the antro-pyloric localization in 19 cases (i.e., 29.23%) and anulcerative budding appearance in 33 subjects (50,77%). Histologically, the moderately differentiated adenocarcinoma is found in 30.77% of patients, followed by well differentiated adenocarcinoma with 26.15% of patients. The immunohistochemical study revealed a positive labeling of half of the T cells by anti-CD3 AC, and a positive labeling of anti-CD20 AC in a diffuse and intense manner, with the presence of CD20-positive lymphoepithelial lesions compatible with CD20 a low grade MALT non-Hodgkin's lymphoma. Conclusion: This framework of analysis revealed some risk factors for gastric cancer, such as food, hygiene, Helicobacter pylori infection, smoking and family history.

Keywords: cancer, Helicobacter pylori, immunohistochemistry, stomach

Procedia PDF Downloads 103
180 Using Autoencoder as Feature Extractor for Malware Detection

Authors: Umm-E-Hani, Faiza Babar, Hanif Durad

Abstract:

Malware-detecting approaches suffer many limitations, due to which all anti-malware solutions have failed to be reliable enough for detecting zero-day malware. Signature-based solutions depend upon the signatures that can be generated only when malware surfaces at least once in the cyber world. Another approach that works by detecting the anomalies caused in the environment can easily be defeated by diligently and intelligently written malware. Solutions that have been trained to observe the behavior for detecting malicious files have failed to cater to the malware capable of detecting the sandboxed or protected environment. Machine learning and deep learning-based approaches greatly suffer in training their models with either an imbalanced dataset or an inadequate number of samples. AI-based anti-malware solutions that have been trained with enough samples targeted a selected feature vector, thus ignoring the input of leftover features in the maliciousness of malware just to cope with the lack of underlying hardware processing power. Our research focuses on producing an anti-malware solution for detecting malicious PE files by circumventing the earlier-mentioned shortcomings. Our proposed framework, which is based on automated feature engineering through autoencoders, trains the model over a fairly large dataset. It focuses on the visual patterns of malware samples to automatically extract the meaningful part of the visual pattern. Our experiment has successfully produced a state-of-the-art accuracy of 99.54 % over test data.

Keywords: malware, auto encoders, automated feature engineering, classification

Procedia PDF Downloads 49