Search results for: cyber villages
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 658

Search results for: cyber villages

298 Wind Energy Potential of Southern Sindh, Pakistan for Power Generation

Authors: M. Akhlaque Ahmed, Maliha Afshan Siddiqui

Abstract:

A study has been carried out to see the prospect of wind power potential of southern Sindh namely Karachi, Hawksbay, Norriabad, Hyderabad, Ketibander and Shahbander using local wind speed data. The monthly average wind speed for these area ranges from 4.5m/sec to 8.5m/sec at 30m height from ground. Extractable wind power, wind energy and Weibul parameter for above mentioned areas have been examined. Furthermore, the power output using fast and slow wind machine using different blade diameter along with the 4Kw and 20 Kw aero-generator were examined to see the possible use for deep well pumping and electricity supply to remote villages. The analysis reveals that in this wind corridor of southern Sindh Hawksbay, Ketibander and Shahbander belongs to wind power class-3 Hyderabad and Nooriabad belongs to wind power class-5 and Karachi belongs to wind power class-2. The result shows that the that higher wind speed values occur between June till August. It was found that considering maximum wind speed location, Hawksbay,Noriabad are the best location for setting up wind machines for power generation.

Keywords: wind energy generation, Southern Sindh, seasonal change, Weibull parameter, wind machines

Procedia PDF Downloads 126
297 A Framework for Blockchain Vulnerability Detection and Cybersecurity Education

Authors: Hongmei Chi

Abstract:

The Blockchain has become a necessity for many different societal industries and ordinary lives including cryptocurrency technology, supply chain, health care, public safety, education, etc. Therefore, training our future blockchain developers to know blockchain programming vulnerability and I.T. students' cyber security is in high demand. In this work, we propose a framework including learning modules and hands-on labs to guide future I.T. professionals towards developing secure blockchain programming habits and mitigating source code vulnerabilities at the early stages of the software development lifecycle following the concept of Secure Software Development Life Cycle (SSDLC). In this research, our goal is to make blockchain programmers and I.T. students aware of the vulnerabilities of blockchains. In summary, we develop a framework that will (1) improve students' skills and awareness of blockchain source code vulnerabilities, detection tools, and mitigation techniques (2) integrate concepts of blockchain vulnerabilities for IT students, (3) improve future IT workers’ ability to master the concepts of blockchain attacks.

Keywords: software vulnerability detection, hands-on lab, static analysis tools, vulnerabilities, blockchain, active learning

Procedia PDF Downloads 60
296 Socioeconomic Benefits in Agroforestry Practices by Rural Community: Case Study in Paitan District, Sabah, Malaysia

Authors: J. Kodoh, H. L. Dumil, M. Maid

Abstract:

Agroforestry system has been widely documented that provide benefits to rural livelihoods and improved socioeconomic status. This study concerns on agroforestry practices in generating local socioeconomic livelihoods. The general approach is to survey local community involvement in the agroforestry activities at four selected rural villages in Paitan district, using a structured questionnaire through personal interview technique. A total of 200 respondents were interviewed where the largest age group of the respondents was more than 50 years old (31%). Almost all respondents had former education (76%), and majority of them were employed (97%) either in the government and private sectors or self-employed. All respondents (100%) were involved in agroforestry activities where agroforestry products as their source of income (Hevea brasiliensis, Durio zibethinus, Elaeis guinensis) and foods (Manihot esculenta, Mangifera sp., Musa sp.) The mean monthly income from selling agroforestry products contributed 16.6% (USD130.37) of the mean total monthly income of the respondents (r=0.407, r²=0.166, p < 0.01). This study also showed that the main driven factor for the respondents (93%) to adopt and sustain the agroforestry practices is their traditional ways of farming that transferred from generation to generation.

Keywords: agroforestry, Paitan district, rural community, socioeconomic

Procedia PDF Downloads 201
295 DISGAN: Efficient Generative Adversarial Network-Based Method for Cyber-Intrusion Detection

Authors: Hongyu Chen, Li Jiang

Abstract:

Ubiquitous anomalies endanger the security of our system con- stantly. They may bring irreversible damages to the system and cause leakage of privacy. Thus, it is of vital importance to promptly detect these anomalies. Traditional supervised methods such as Decision Trees and Support Vector Machine (SVM) are used to classify normality and abnormality. However, in some case, the abnormal status are largely rarer than normal status, which leads to decision bias of these methods. Generative adversarial network (GAN) has been proposed to handle the case. With its strong generative ability, it only needs to learn the distribution of normal status, and identify the abnormal status through the gap between it and the learned distribution. Nevertheless, existing GAN-based models are not suitable to process data with discrete values, leading to immense degradation of detection performance. To cope with the discrete features, in this paper, we propose an efficient GAN-based model with specifically-designed loss function. Experiment results show that our model outperforms state-of-the-art models on discrete dataset and remarkably reduce the overhead.

Keywords: GAN, discrete feature, Wasserstein distance, multiple intermediate layers

Procedia PDF Downloads 102
294 Nutritional Composition of Selected Wild Fruits from Minna Area of Niger State, Nigeria

Authors: John O. Jacob, Abdullahi Mann, Olanrewaju I. Adeshina, Mohammed M. Ndamitso

Abstract:

Strychnos spinosa, Detarium microcarpum, Diospyros mespiliformis, Dialium guineese and Gardenia ternifolia are some of the wild fruits consume in the villages around Minna, Niger State. This investigation was conducted to assess the nutritional potentials of these fruits both for human consumption and for possible application in animal feed formulations. Standard analytical methods were employed in the determination of the various nutritional parameters. The proximate analysis results showed that the moisture contents ranged between (6.17-10.70%); crude fat (2.04-8.85%); crude protein (5.16-6.80%); crude fibre (7.23-19.65%); Ash (3.46-5.56%); carbohydrate (57.77-69.79%); energy value (284.49-407 kcal/mg); Vitamin C (7.2-39.93 mg/100g). The mineral analysis shows that the selected wild fruits could contribute considerable amount of both micro and macro elements to human nutrition potassium, sodium and calcium range between; potassium (343.27-764.71%); sodium (155.04-348.44%); calcium (52.47-101%). The macro element for the fruits pulp were in the order K>Na>Mg>Ca, hence, they could be included in diet to supplement daily nutrient requirement and in animal feed formulations. The domestication of these fruits is also encouraged.

Keywords: mineral, micro-elements, macro-elements, feed suppleme

Procedia PDF Downloads 420
293 Jirga: A Traditional Approach to Peacebuidling in Conflict Affected Fragile Communities of Khyber Pakhtunkhwa

Authors: Nizar Ahmad, Mushtaq Ahmad Jadoon, Farhat Ullah

Abstract:

This study investigates the peace efforts made by Pakhtun’s traditional institution Jirga in conflict-affected communities of Khyber Pakhtunkhwa. Data were collected through a structured interview schedule from a sample of 278 household members in four selected villages of Dir Upper and Dir Lower Districts. A Chi square test was applied to ascertain relationships between Jirga related factors with the state of peace in the study area. It was found that factors such as Jirga regularly conducted meetings (P=. 000), it inflicted punishment upon local militants (P=. 001), ex-combatants were re-integrated through Jirga (P= .000) and Jirga ordered the local the defiant to leave the community had a significant association with state of peace in the area. It is concluded that Jirga system had played a vital role in the peacebuilding process of the area through provision of support to government in peace operation and mobilizing local people for peace in the area. It is suggested that Jirga shall to be the part of peace process and government needs to provide its possible support to members of the Jirga in order to enhance their capacity of peace work.

Keywords: Jirga, peacebuilding, terrorism, traditional mechanism, conflict affect areas

Procedia PDF Downloads 308
292 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

Authors: Jean Rosemond Dora, Karol Nemoga

Abstract:

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.

Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model

Procedia PDF Downloads 143
291 Users and Non-Users of Social Media: An Exploratory Study of Rural Women in Eastern Uttar Pradesh

Authors: Neha Bhushan

Abstract:

For the purpose of this study a village of district Azamgarh has been selected which is a part of the most populous and backward state of the country, Uttar Pradesh. In the age of information, everyone has the right to acquire information and it becomes important to assess the acceptance and non-acceptance of social media among rural population. Rural women of the state are showing positive trends in the form of increased social media and mobile usage. This study is an effort to know the purpose of rural women for using social media. The study design is exploratory and qualitative in nature. Data collection primarily consisted of 25 semi-structured individual interviews having 10 open-ended specific questions in one of the villages of Azamgarh district of Eastern Uttar Pradesh. Sampling approach is flexible and situational. Data reveals that rural women have become active on social media since last six months to one year. Most of them are using Facebook, Whatsapp, and YouTube for the purpose of interaction, learning new skills, checking out recipes and latest fashion. This pilot study gives a bird eye view of the problem and opens door for exploring this least explored area.

Keywords: exploratory research, mobile usage, rural women, social media

Procedia PDF Downloads 117
290 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping

Authors: Andre Slonopas, Zona Kostic, Warren Thompson

Abstract:

Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.

Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory

Procedia PDF Downloads 163
289 A Site Unexplored: Recently Discovered In Bangladesh

Authors: Md. Rifat-Ur- Rahman

Abstract:

Dhamairnagar, Sirajganj, Bangladesh, local villagers describe the peculiar mounds spotted scattered among the nearby villages as “Buruj”. Among these, a mound was explored in one of these mounds, in Khirtala village, in early 2019. Primary archaeological surveys and map making has been conducted in this site, where suspect lays the remains of an 8 square miles city, at least 1200 years old. In the government gazettes of Bangladesh from 1990, this place has been linked with a mythical kind from the Indian epic, Mahabharata. In the primary explorations, found bricks, mortars, different kinds of potteries and terracotta pieces. Assumable observation is that this city was a flourishing establishment during the early Pala dynasty of Bengal (800 AD to 1200 AD). At present there are four indigenous groups live around this site and they are known as Mahato, Teli, Oraon and Santals. These four indigenous groups are considered as the core four of Bengali ethnicity. In the folklore of these groups we find stories of ancient kingdoms which have not been documented through archaeological findings yet. So, a question rises about the population that was used to reside in this archaeological site. Were they the ancestors of these indigenous tribes that are dwelling in this area? With such primary information, the aim is to conduct a comparative study of the physiology; osteology and cultural practices of this civilization.

Keywords: Archaeology, Heritage, Indigenous Peoples, Physiology

Procedia PDF Downloads 111
288 Community Perception of Dynamics and Drivers of Land Cover Change around Pendjari Biosphere Reserve in Northern Benin

Authors: Jesugnon E. A. Kpodo, Aurlus D. Ouindeyama, Jan H. Sommer, Fifanou G. Vodouhe, Kolo Yeo

Abstract:

Local communities are recognized as key actors for sustainable land use and to some extent actors driving land use land cover (LULC) change around protected areas. Understanding drivers responsible for these changes are very crucial for better policy decisions making. This study analyzed perception of 425 local people in 28 villages towards land cover change around Pendjari Biosphere Reserve using semi-structured questionnaire. 72.9% of local communities perceive land cover as degrading while 24.5% as improving and only 2.6% as stable during the five last years. Women perceived more land cover degradation than men do (84.1 vs. 67.1%). Local communities identified cultivated land expansion, logging, firewood collection, charcoal production, population growth, and poverty as the key drivers of declined LULC in the study area. Education has emerged as a significant factor influencing respondents’ perceptions of these drivers of LULC changes. Appropriate management measures and government policies should be implemented around Pendjari Biosphere Reserve to control drivers of LULC change.

Keywords: local perceptions, LULC drivers, LULC dynamics, Pendjari Biosphere Reserve, rural livelihoods, sustainable resource management

Procedia PDF Downloads 95
287 Digital Activism and the Individual: A Utilitarian Perspective

Authors: Tania Mitra

Abstract:

Digital Activism or Cyber Activism uses digital media as a means to disseminate information and mobilize masses towards a specific goal. When digital activism was first born in the early 1990s, it was primarily used by groups of organized political activists. However, with the advent of social media, online activism has filtered down to the individual- one who does not necessarily belong to or identify with an agenda, group, or political party. A large part of digital activism today stems from the individual’s notion of what is right and wrong. This gives rise to a discourse around descriptive ethics and the implications of the independent digital activist. Although digital activism has paved the way for and bolstered support for causes like the MeToo Movement and Black Lives Matter, the lack of a unified, organized body has led to counterintuitive progressions and suspicions regarding the movements. The paper introduces the ideas of 'clout' culture, click baits, and clicktivism (the phenomenon where activism is reduced to a blind following of the online trends), to discuss the impacts of exclusive digital activism. By using Jeremy Bentham's utilitarian approach to ethics, that places emphasis on the best possible outcome for a society, the paper will show how individual online activism reaching for a larger, more common end can sometimes lead to an undermining of that end, not only in the online space but also how it manifests in the real world.

Keywords: digital activism, ethics, independent digital activist, utilitarianism

Procedia PDF Downloads 103
286 Assessment of Non-Timber Forest Products from Community Managed Forest of Thenzawl Forest Division, Mizoram, Northeast India

Authors: K. Lalhmingsangi, U. K. Sahoo

Abstract:

Non-Timber Forest Products represent one of the key sources of income and subsistence to the fringe communities living in rural areas. A study was conducted for the assessment of NTFP within the community forest of five villages under Thenzawl forest division. Participatory Rural Appraisal (PRA), questionnaire, field exercise, discussion and interview with the first hand NTFP exploiter and sellers was adopted for the field study. Fuel wood, medicinal plants, fodder, wild vegetables, fruits, broom grass, thatch grass, bamboo pole and cane species are the main NTFP harvested from the community forest. Among all the NTFPs, the highest percentage of household involvement was found in fuel wood, i.e. 53% of household and least in medicinal plants 5%. They harvest for their own consumption as well as for selling to the market to meet their needs. Edible food and fruits are sold to the market and it was estimated that 300 (Rs/hh/yr) was earned by each household through the selling of this NTFP from the community forest alone. No marketing channels are linked with fuelwood, medicinal plants and fodder since they harvest only for their own consumption.

Keywords: community forest, subsistence, non-timber forest products, Thenzawl Forest Division

Procedia PDF Downloads 125
285 Man Eaters and the Eaten Men: A Study of the Portrayal of Indians in the Writings of Jim Corbett

Authors: Iti Roychowdhury

Abstract:

India to the Colonial mind was a crazy quilt of multicoloured patchwork- a land of untold wealth and bejewelled maharajas, of snake charmers and tight rope walkers. India was also the land that offered unparalled game. Indeed Shikar (hunting) was de rigueur for the Raj experience. Tales of shootings and trophies were told and retold in clubs and in company. Foremost among the writers of this genre is Jim Corbett – tracker, hunter, writer, conservationist. Corbett is best known for the killing of man eating tigers and his best known books are Man eaters of Kumaon, The Temple Tiger, Man eating Leopard of Rudraprayag etc. The stories of Jim Corbett are stories of hunting, with no palpable design, no subtext of hegemony, or white man’s burden. The protagonists are the cats. Nevertheless from his writings emerge a vibrant picture of Indian villages, of men, women and children toiling for a livelihood under the constant shadow of the man eaters. Corbett shared a symbiotic relationship with the villagers. They needed him to kill the predators while Corbett needed the support of the locals as drum beaters, coolies and runners to accomplish his tasks. The aim of the present paper is to study the image of Indians in the writings of Jim Corbett and to examine them in the light of colonial perception of Indians.

Keywords: hegemony, orientalism, Shikar literature, White Man's Burden

Procedia PDF Downloads 254
284 Research on the Application of Renewability in the Construction Model of Zhejiang Rural Revitalization

Authors: Zheng Junchao, Wang Zhu

Abstract:

With the advancement of China's urbanization process, the Chinese government has put forward the strategy of rural revitalization which is aiming at realizing the comprehensive integration of urban and rural areas and the comprehensive revitalization of rural areas. The path of rural revitalization in Zhejiang province put forward a typical model from four dimensions: suburban area, plain, island and mountain area. Research methods include on-the-spot investigation, visiting a number of successful demonstration villages in Zhejiang and interviewing village officials. Based on the location conditions, resource endowments, industrial forms and development foundations of Zhejiang Province, this paper introduces in detail the model of rural revitalization in Zhejiang Province and the challenges it encounters, as well as the role of building construction. The rural development model of Zhejiang province makes the rural culture flourish. Taking the construction of rural scenic spots as the carrier, the rural culture, and natural landscape are constantly improved. It provides a model and template for the country's rural revitalization. The promotion of Zhejiang rural revitalization model will improve the current rural landscape, living standard and industrial structure, which will narrow the urban-rural gap greatly.

Keywords: comprehensive rural revitalization, Zhejiang model, reproducible, comprehensive integration

Procedia PDF Downloads 176
283 Displacement Situation in Federally Administered Tribal Areas of Pakistan: Issues and Challenges

Authors: Sohail Ahmad, Inayat Kaleem

Abstract:

Federally Administered Tribal Area(FATA) of Pakistan is one of the most neglected regions in the world as far as development is concerned. It has been the hub of all sorts of illegal activities including militancy and export of terrorism. Therefore, it became inevitable for the government of Pakistan to take action against militants through military operations. Small and large scale military operations are being taken against the non-state actors in FATA with continuity. Over the years, hundreds of thousands have been displaced from the tribal areas of the country. Moreover, military operation Zarb-e-Azb has been launched in North Waziristan Agency in June 2014 to counter militancy across the Af-Pak border region. Though successful in curbing militancy, the operation has displaced around 0.5 million people from the area. Most of them opt to take shelter in the government installed shelter camps, some of them take refuge outside tent villages in the country while some of them prefer to cross into Afghanistan rather their own country Pakistan. This paper will evaluate how the influx of these internally displaced persons in the country is influencing the socio-economic situation of not only the displaced but of the hosting areas as well. Secondly, attention would be given to gauge the impact of such a huge number of displaced population on the law and order and security situation in the host areas.

Keywords: Af-Pak, federally administered tribal area, IDPs, internal displacement, Pakistan

Procedia PDF Downloads 293
282 Decentralized Wastewater Treatment in Coastal Touristic Areas Using Standardized Modular Biological Filtration (SMBF)

Authors: Andreas Rüdiger

Abstract:

The selection of appropriate wastewater treatment technology for decentralized coastal tourist areas is an important engineering challenge. The local situation in coastal tourist cities and villages is characterized by important daily and seasonal fluctuations in hydraulic flow and pollution, high annual temperature variations, scarcity of building area and high housing density. At the same time, coastal zones have to meet stringent effluent limits all over the year and need simple and easy technologies to operate. This article presents the innovative technology of standardized modular aerated up-flow biofiltration SMBF as an adapted solution for decentralized wastewater treatment in sensitive touristic coastal areas. As modular technology with several biofiltration units, the system is able to treat low and high loads with low energy consumption and low demands for operators. The article focuses on the climatic and tourist situation in Croatia. Full-scale plants in Eastern Europe and Croatia have presented as well as dimensioning parameters and outlet concentrations. Energy consumption as a function of load is demonstrated.

Keywords: wastewater treatment, biofiltration, touristic areas, energy saving

Procedia PDF Downloads 68
281 Assessing Impacts of Climate Change on Rural Water Resources

Authors: Ntandoyenkosi Moyo

Abstract:

Majority of rural Eastern Cape villages of South Africa households do not have access to safe water supply. Due to changes in climatic conditions for example higher temperatures, these sources become not reliable in supplying adequate and safe water to the population. These rural populations due to the drying up of water resources have to find other alternative ways to get water. Climate change has an impact on the reliability of water resources and this has an impact on rural communities. This study seeks to establish what alternative ways do people use when affected by unfavorable conditions like less rainfall and increased temperatures. The study also seeks to investigate any local and provincial intervention in the provision of water to the village. Interventions can be in the form of programmes or initiatives that involve water supply strategies. The community should participate fully in making sure that their place is serviced. The study will identify households with improved sources (JOJO tanks) and those with unimproved sources (rivers) and investigate what alternatives they resort to when their sources dry up. The study also investigates community views on whether they have any challenges of water supply (reliability and adequacy) as required by section 27(1) (b) of the constitution which states that everyone should have access to safe and clean water.

Keywords: rural water resources, temperature, improved sources, unimproved sources

Procedia PDF Downloads 303
280 Identity Formation Towards Design Typology of Malay Traditional House in Negeri Sembilan, Malaysia

Authors: Noor Hayati Binti Ismail, Mastor Bin Surat, Raja Nafida Binti Raja Shahminan, Shahrul Kamil Bin Yunus

Abstract:

Traditional Malay house built in the various custom and culture for every state in Malaysia. Each state has its characteristics, design and different concepts that form the distinctive identity. The uniqueness of a traditional house design is a symbolize of Negeri Sembilan society. The purpose of this paper is to introduce the feature, a traditional Malay house in Negeri Sembilan, Malaysia. This typology will describe five types of traditional Malay houses in Negeri Sembilan by briefly about the concept of a traditional Malay house design. The design represents a variety of purposes that are often associated with its own culture and customs practiced by the community. In addition, the design of long tapering roof with both ends of the roof went up a little bit architecture has become an identity of its own in Negeri Sembilan. The study involves several villages of traditional houses in Negeri Sembilan, Malaysia. Data collection was obtained through a process of observation, interviews, questionnaire and taking photos related. Through this research, We are expected to provide awareness and also a reference to the next generation of traditional houses in Malaysia especially in Negeri Sembilan. Identity and uniqueness of traditional houses Negeri Sembilan increasingly difficult to maintain and can be kept from being lost in their own land.

Keywords: design, identity, traditional Malay house, typology

Procedia PDF Downloads 596
279 Population Ecology of the House Rat (Rattus rattus) in Rural Human Dwelling of Pothwar Plateau, Pakistan

Authors: Surrya Khanam

Abstract:

Understanding the population characteristics of pest species is crucial to develop suitable management plans. The present study was aimed to determine the population ecology of House rat (Rattus rattus) in rural human dwellings of Pothwar, Pakistan. Seasonal rodent trapping was conducted in four villages of Pothwar area from March 2012 to February 2014. A total of 217 individuals of R.rattus were captured from houses, shops, and farm houses. There was no significant difference in the abundance of species across different trapping seasons. The species sex ratio was unbiased and did not differ significantly from 1:1 at all the sites and across all the trapping seasons. The population of R. Rattus had individuals of different age groups, viz., juvenile, sub adults and adults. Overall, more adult individuals were captured in spring and summer season. Breeding activity was continuous throughout the year and reproductively active individuals relatively outnumbered inactive individuals. The results showed that village indoor habitats provided a suitable habitat for rat populations all the year round. The information obtained from this study will be helpful in the development of control strategies for R. rattus populations in commensal habitats.

Keywords: ecology, indoor pests, Rattus rattus, population characteristics

Procedia PDF Downloads 124
278 Malaria and Environmental Sanitation

Authors: Soorya Vennila

Abstract:

A comprehensive study of malaria in 165 villages (hamlets) in Harur block, Dharmapuri district, has revealed the fact that there are distinct episodes of malaria due to An. culicifacies, the vector, causes persistent transmission in the revenue village called Vedakatamaduvu. A total of 300 household adult samples are randomly selected to study both quantitatively and qualitatively the vulnerability of malaria. On the basis of the response, the problem uncommon with groups was identified as the outdoor routine, particularly open defecation, with which the samples needed to be stratified into two major groups; users of toilets 21 and those who practice open defecation 279. Open defecation, as the habit-based vulnerability, is measured with the Pearson correlation coefficient to estimate the relationship between malaria and open defecation. It is also verified from the literature that plant fluids provide mosquitoes not only with energy but also with nutrition, to the extent that they can develop fertile eggs. In the endemic areas, the bushy Presopis Juliflora, which naturally serves as a feeding and resting spot for mosquitoes, serves as a cover to practice open defecation as well. Eventually, those who get resort to Presopis for open defecation have a higher chance of getting exposed to mosquito bites and being infected with malaria. The study concludes that the combination of bushy Prosopis Juliflora and open defecation leaves the place perpetually vulnerable to malaria.

Keywords: Malaria, open defecation, endemic, presopis juliflora

Procedia PDF Downloads 69
277 Real-Time Network Anomaly Detection Systems Based on Machine-Learning Algorithms

Authors: Zahra Ramezanpanah, Joachim Carvallo, Aurelien Rodriguez

Abstract:

This paper aims to detect anomalies in streaming data using machine learning algorithms. In this regard, we designed two separate pipelines and evaluated the effectiveness of each separately. The first pipeline, based on supervised machine learning methods, consists of two phases. In the first phase, we trained several supervised models using the UNSW-NB15 data-set. We measured the efficiency of each using different performance metrics and selected the best model for the second phase. At the beginning of the second phase, we first, using Argus Server, sniffed a local area network. Several types of attacks were simulated and then sent the sniffed data to a running algorithm at short intervals. This algorithm can display the results of each packet of received data in real-time using the trained model. The second pipeline presented in this paper is based on unsupervised algorithms, in which a Temporal Graph Network (TGN) is used to monitor a local network. The TGN is trained to predict the probability of future states of the network based on its past behavior. Our contribution in this section is introducing an indicator to identify anomalies from these predicted probabilities.

Keywords: temporal graph network, anomaly detection, cyber security, IDS

Procedia PDF Downloads 79
276 Digital Forensics Compute Cluster: A High Speed Distributed Computing Capability for Digital Forensics

Authors: Daniel Gonzales, Zev Winkelman, Trung Tran, Ricardo Sanchez, Dulani Woods, John Hollywood

Abstract:

We have developed a distributed computing capability, Digital Forensics Compute Cluster (DFORC2) to speed up the ingestion and processing of digital evidence that is resident on computer hard drives. DFORC2 parallelizes evidence ingestion and file processing steps. It can be run on a standalone computer cluster or in the Amazon Web Services (AWS) cloud. When running in a virtualized computing environment, its cluster resources can be dynamically scaled up or down using Kubernetes. DFORC2 is an open source project that uses Autopsy, Apache Spark and Kafka, and other open source software packages. It extends the proven open source digital forensics capabilities of Autopsy to compute clusters and cloud architectures, so digital forensics tasks can be accomplished efficiently by a scalable array of cluster compute nodes. In this paper, we describe DFORC2 and compare it with a standalone version of Autopsy when both are used to process evidence from hard drives of different sizes.

Keywords: digital forensics, cloud computing, cyber security, spark, Kubernetes, Kafka

Procedia PDF Downloads 371
275 Identifying Karst Pattern to Prevent Bell Spring from Being Submerged in Daryan Dam Reservoir

Authors: H. Shafaattalab Dehghani, H. R. Zarei

Abstract:

The large karstic Bell spring with a discharge ranging between 250 and 5300 lit/ sec is one of the most important springs of Kermanshah Province. This spring supplies drinking water of Nodsheh City and its surrounding villages. The spring is located in the reservoir of Daryan Dam and its mouth would be submerged after impounding under a water column of about 110 m height. This paper has aimed to render an account of the karstification pattern around the spring under consideration with the intention of preventing Bell Spring from being submerged in Daryan Dam Reservoir. The studies comprise engineering geology and hydrogeology investigations. Some geotechnical activities included in these studies include geophysical studies, drilling, excavation of exploratory gallery and shaft and diving. The results depict that Bell is a single-conduit siphon spring with 4 m diameter and 85 m height that 32 m of the conduit is located below the spring outlet. To survive the spring, it was decided to plug the outlet and convey the water to upper elevations under the natural pressure of the aquifer. After plugging, water was successfully conveyed to elevation 837 meter above sea level (about 120 m from the outlet) under the natural pressure of the aquifer. This signifies the accuracy of the studies done and proper recognition of the karstification pattern of Bell Spring. This is a unique experience in karst problems in Iran.

Keywords: bell spring, Karst, Daryan Dam, submerged

Procedia PDF Downloads 253
274 An Approach to Practical Determination of Fair Premium Rates in Crop Hail Insurance Using Short-Term Insurance Data

Authors: Necati Içer

Abstract:

Crop-hail insurance plays a vital role in managing risks and reducing the financial consequences of hail damage on crop production. Predicting insurance premium rates with short-term data is a major difficulty in numerous nations because of the unique characteristics of hailstorms. This study aims to suggest a feasible approach for establishing equitable premium rates in crop-hail insurance for nations with short-term insurance data. The primary goal of the rate-making process is to determine premium rates for high and zero loss costs of villages and enhance their credibility. To do this, a technique was created using the author's practical knowledge of crop-hail insurance. With this approach, the rate-making method was developed using a range of temporal and spatial factor combinations with both hypothetical and real data, including extreme cases. This article aims to show how to incorporate the temporal and spatial elements into determining fair premium rates using short-term insurance data. The article ends with a suggestion on the ultimate premium rates for insurance contracts.

Keywords: crop-hail insurance, premium rate, short-term insurance data, spatial and temporal parameters

Procedia PDF Downloads 23
273 Analysis of Cyber Activities of Potential Business Customers Using Neo4j Graph Databases

Authors: Suglo Tohari Luri

Abstract:

Data analysis is an important aspect of business performance. With the application of artificial intelligence within databases, selecting a suitable database engine for an application design is also very crucial for business data analysis. The application of business intelligence (BI) software into some relational databases such as Neo4j has proved highly effective in terms of customer data analysis. Yet what remains of great concern is the fact that not all business organizations have the neo4j business intelligence software applications to implement for customer data analysis. Further, those with the BI software lack personnel with the requisite expertise to use it effectively with the neo4j database. The purpose of this research is to demonstrate how the Neo4j program code alone can be applied for the analysis of e-commerce website customer visits. As the neo4j database engine is optimized for handling and managing data relationships with the capability of building high performance and scalable systems to handle connected data nodes, it will ensure that business owners who advertise their products at websites using neo4j as a database are able to determine the number of visitors so as to know which products are visited at routine intervals for the necessary decision making. It will also help in knowing the best customer segments in relation to specific goods so as to place more emphasis on their advertisement on the said websites.

Keywords: data, engine, intelligence, customer, neo4j, database

Procedia PDF Downloads 170
272 Data Modeling and Calibration of In-Line Pultrusion and Laser Ablation Machine Processes

Authors: David F. Nettleton, Christian Wasiak, Jonas Dorissen, David Gillen, Alexandr Tretyak, Elodie Bugnicourt, Alejandro Rosales

Abstract:

In this work, preliminary results are given for the modeling and calibration of two inline processes, pultrusion, and laser ablation, using machine learning techniques. The end product of the processes is the core of a medical guidewire, manufactured to comply with a user specification of diameter and flexibility. An ensemble approach is followed which requires training several models. Two state of the art machine learning algorithms are benchmarked: Kernel Recursive Least Squares (KRLS) and Support Vector Regression (SVR). The final objective is to build a precise digital model of the pultrusion and laser ablation process in order to calibrate the resulting diameter and flexibility of a medical guidewire, which is the end product while taking into account the friction on the forming die. The result is an ensemble of models, whose output is within a strict required tolerance and which covers the required range of diameter and flexibility of the guidewire end product. The modeling and automatic calibration of complex in-line industrial processes is a key aspect of the Industry 4.0 movement for cyber-physical systems.

Keywords: calibration, data modeling, industrial processes, machine learning

Procedia PDF Downloads 260
271 An Efficient Discrete Chaos in Generalized Logistic Maps with Applications in Image Encryption

Authors: Ashish Ashish

Abstract:

In the last few decades, the discrete chaos of difference equations has gained a massive attention of academicians and scholars due to its tremendous applications in each and every branch of science, such as cryptography, traffic control models, secure communications, weather forecasting, and engineering. In this article, a generalized logistic discrete map is established and discrete chaos is reported through period doubling bifurcation, period three orbit and Lyapunov exponent. It is interesting to see that the generalized logistic map exhibits superior chaos due to the presence of an extra degree of freedom of an ordered parameter. The period doubling bifurcation and Lyapunov exponent are demonstrated for some particular values of parameter and the discrete chaos is determined in the sense of Devaney's definition of chaos theoretically as well as numerically. Moreover, the study discusses an extended chaos based image encryption and decryption scheme in cryptography using this novel system. Surprisingly, a larger key space for coding and more sensitive dependence on initial conditions are examined for encryption and decryption of text messages, images and videos which secure the system strongly from external cyber attacks, coding attacks, statistic attacks and differential attacks.

Keywords: chaos, period-doubling, logistic map, Lyapunov exponent, image encryption

Procedia PDF Downloads 122
270 Study of Village Scale Community Based Water Supply and Sanitation Program (Pamsimas) in Indonesia

Authors: Reza Eka Putra

Abstract:

Pamsimas is a community based drinking water supply and sanitation program which is contributed by local community, local government, central government, and World Bank with the aim of achieving Water Supply and Sanitation - the Millennium Development Goals (WSS-MDGs) target. This program is supported by the Ministry of Public Works as the executing agency with the cooperation of Ministry of Interior and the Ministry of Health. Field observations were conducted in two rural samples of 2009 beneficiaries Pamsimas West Java, which is in Ponggang Village, Subang District. The study was evaluated through several parameters, including technical, health, and empowerment aspect. Evaluation was done by comparing the parameters of success that has been set by Pamsimas through Pamsimas book manuals with the parameters from Sanitation & Infrastructure course regarding the appropriate application of technology in society. The result of the study is that the potency of the community before the program is implemented in the village is the determining factor. Stronger cooperation pattern in Ponggang Vilage results in a successful program. Both villages showed a pattern of behavior changes from indiscriminate defecation to sanitary latrine use. Besides, there is a decline in the number of cases of diarrheal disease since the year of Pamsimas implementation.

Keywords: millenium development goals, community develpoment, water supply, sanitation

Procedia PDF Downloads 229
269 Platooning Method Using Dynamic Correlation of Destination Vectors in Urban Areas

Authors: Yuya Tanigami, Naoaki Yamanaka, Satoru Okamoto

Abstract:

Economic losses due to delays in traffic congestion regarding urban transportation networks have become a more serious social problem as traffic volume increases. Platooning has recently been attracting attention from many researchers to alleviate traffic jams, especially on the highway. On highways, platooning can have positive effects, such as reducing inter-vehicular distance and reducing air resistance. However, the impacts of platooning on urban roads have not been addressed in detail since traffic lights may break the platoons. In this study, we propose a platooning method using L2 norm and cosine similarity to form a platoon with highly similar routes. Also, we investigate the sorting method within a platoon according to each vehicle’s straightness. Our proposed sorting platoon method, which uses two lanes, eliminates Head of Line Blocking at the intersection and improves throughput at intersections. This paper proposes a cyber-physical system (CPS) approach to collaborative urban platoon control. We conduct simulations using the traffic simulator SUMO and the road network, which imitates Manhattan Island. Results from the SUMO confirmed that our method shortens the average travel time by 10-20%. This paper shows the validity of forming a platoon based on destination vectors and sorting vehicles within a platoon.

Keywords: CPS, platooning, connected car, vector correlation

Procedia PDF Downloads 53