Search results for: risks and vulnerabilities
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1824

Search results for: risks and vulnerabilities

1404 Before Decision: Career Motivation of Teacher Candidates

Authors: Pál Iván Szontagh

Abstract:

We suppose that today, the motivation for the career of a pedagogue (including its existential, organizational and infrastructural conditions) is different from the level of commitment to the profession of an educator (which can be experienced informally, or outside of the public education system). In our research, we made efforts to address the widest possible range of student elementary teachers, and to interpret their responses using different filters. In the first phase of our study, we analyzed first-year kindergarten teacher students’ career motivation and commitment to the profession, and in the second phase, that of final-year kindergarten teacher candidates. In the third phase, we conducted surveys to explore students’ motivation for the profession and the career path of a pedagogue in four countries of the Carpathian Basin (Hungary, Slovakia, Romania and Serbia). The surveys were conducted in 17 campuses of 11 Hungarian teacher’s training colleges and universities. Finally, we extended the survey to practicing graduates preparing for their on-the-job rating examination. Based on our results, in all breakdowns, regardless of age group, training institute or - in part - geographical location and nationality, it is proven that lack of social- and financial esteem of the profession poses serious risks for recruitment and retention of teachers. As a summary, we searched for significant differences between the professional- and career motivations of the three respondent groups (kindergarten teacher students, elementary teacher students and practicing teachers), i.e. the motivation factors that change the most with education and/or with the time spent on the job. Based on our results, in all breakdowns, regardless of age group, training institute or - in part - geographical location and nationality, it is proven that lack of social- and financial esteem of the profession poses serious risks for recruitment and retention of teachers.

Keywords: career motivation, career socialization, professional motivation, teacher training

Procedia PDF Downloads 110
1403 Mapping of Risks and Opportunities for Adolescents Girls’ Sexual and Reproductive Health in Peri-Urban Setting in Mwanza, Tanzania

Authors: Soori Nnko, Zaina Mchome, John Dusabe, Angela Obasi

Abstract:

In sub-Saharan Africa, adolescent girls living in urban and periurban settings are among the groups at increased risk of getting sexually transmitted infections. One of the challenges to improve uptake of sexual and reproductive health (SRH) services among adolescents is linked to little appreciation about their vulnerability and the knowledge on availability of the SRH services. Objective: This study assesses adolescents’ perceptions on risks for SRH problems and the availability of services to prevent against SRH problems. Methodology: The study was conducted in March 2011 in Mwanza region, Tanzania. Data collection techniques included 18 Participatory Group Discussions and 17 In-depth Interviews with adolescents and young mothers aged 15-20 years. Results: Adolescents indicated that risk places included their homes, bushes, commercial centers, roadsides as well as school settings. Risk for having unprotected sex varied depending on where you are, and the time of the day. For example, collection of firewood in the bushes or water from the wells exposed girls to men who forced or lured them to have sex. The girls reported to encounter motorcyclists who offered the ride in exchange for sex. Girls also knew myriads places to seek SRH services, including public and private clinics, drug shops and traditional healers. Despite being aware of risky environment, and places to seek the services, access to SRH services were limited due to the stigma and negative attitude of community regarding adolescents’ utilization of SRH services. Conclusion: Adolescents are exposed to various risky environments, yet due to social stigma they have difficult to access the available SRH services.

Keywords: adolescent girls, sexual and reproductive health, AIDS, risk, opportunities, interventions, sub Saharan africa

Procedia PDF Downloads 417
1402 A Review of Soil Stabilization Techniques

Authors: Amin Chegenizadeh, Mahdi Keramatikerman

Abstract:

Soil stabilization is a crucial issue that helps to remove of risks associated with the soil failure. As soil has applications in different industries such as construction, pavement and railways, the means of stabilizing soil are varied. This paper will focus on the techniques of stabilizing soils. It will do so by gathering useful information on the state of the art in the field of soil stabilization, investigating both traditional and advanced methods. To inquire into the current knowledge, the existing literature will be divided into categories addressing the different techniques.

Keywords: review, soil, stabilization, techniques

Procedia PDF Downloads 517
1401 An Inquiry into the Usage of Complex Systems Models to Examine the Effects of the Agent Interaction in a Political Economic Environment

Authors: Ujjwall Sai Sunder Uppuluri

Abstract:

Group theory is a powerful tool that researchers can use to provide a structural foundation for their Agent Based Models. These Agent Based models are argued by this paper to be the future of the Social Science Disciplines. More specifically, researchers can use them to apply evolutionary theory to the study of complex social systems. This paper illustrates one such example of how theoretically an Agent Based Model can be formulated from the application of Group Theory, Systems Dynamics, and Evolutionary Biology to analyze the strategies pursued by states to mitigate risk and maximize usage of resources to achieve the objective of economic growth. This example can be applied to other social phenomena and this makes group theory so useful to the analysis of complex systems, because the theory provides the mathematical formulaic proof for validating the complex system models that researchers build and this will be discussed by the paper. The aim of this research, is to also provide researchers with a framework that can be used to model political entities such as states on a 3-dimensional plane. The x-axis representing resources (tangible and intangible) available to them, y the risks, and z the objective. There also exist other states with different constraints pursuing different strategies to climb the mountain. This mountain’s environment is made up of risks the state faces and resource endowments. This mountain is also layered in the sense that it has multiple peaks that must be overcome to reach the tallest peak. A state that sticks to a single strategy or pursues a strategy that is not conducive to the climbing of that specific peak it has reached is not able to continue advancement. To overcome the obstacle in the state’s path, it must innovate. Based on the definition of a group, we can categorize each state as being its own group. Each state is a closed system, one which is made up of micro level agents who have their own vectors and pursue strategies (actions) to achieve some sub objectives. The state also has an identity, the inverse being anarchy and/or inaction. Finally, the agents making up a state interact with each other through competition and collaboration to mitigate risks and achieve sub objectives that fall within the primary objective. Thus, researchers can categorize the state as an organism that reflects the sum of the output of the interactions pursued by agents at the micro level. When states compete, they employ a strategy and that state which has the better strategy (reflected by the strategies pursued by her parts) is able to out-compete her counterpart to acquire some resource, mitigate some risk or fulfil some objective. This paper will attempt to illustrate how group theory combined with evolutionary theory and systems dynamics can allow researchers to model the long run development, evolution, and growth of political entities through the use of a bottom up approach.

Keywords: complex systems, evolutionary theory, group theory, international political economy

Procedia PDF Downloads 110
1400 Measurement of Susceptibility Users Using Email Phishing Attack

Authors: Cindy Sahera, Sarwono Sutikno

Abstract:

Rapid technological developments also have negative impacts, namely the increasing criminal cases based on technology or cybercrime. One technique that can be used to conduct cybercrime attacks are phishing email. The issue is whether the user is aware that email can be misused by others so that it can harm the user's own? This research was conducted to measure the susceptibility of selected targets against email abuse. The objectives of this research are measurement of targets’ susceptibility and find vulnerability in email recipient. There are three steps being taken in this research, (1) the information gathering phase, (2) the design phase, and (3) the execution phase. The first step includes the collection of the information necessary to carry out an attack on a target. The next step is to make the design of an attack against a target. The last step is to send phishing emails to the target. The levels of susceptibility are three: level 1, level 2 and level 3. Level 1 indicates a low level of targets’ susceptibility, level 2 indicates the intermediate level of targets’ susceptibility, and level 3 indicates a high level of targets’ susceptibility. The results showed that users who are on level 1 and level 2 more that level 3, which means the user is not too careless. However, it does not mean the user to be safe. There are still vulnerabilities that may occur, such as automatic location detection when opening emails and automatic downloaded malware as user clicks a link in the email.

Keywords: cybercrime, email phishing, susceptibility, vulnerability

Procedia PDF Downloads 256
1399 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 182
1398 The Relationship between Fight-Flight-Freeze System, Level of Expressed Emotion in Family, and Emotion Regulation Difficulties of University Students: Comparison Experienced to Inexperienced Non-Suicidal Self-Injury Students (NSSI)

Authors: Hyojung Shin, Munhee Kweon

Abstract:

Non-suicide Self Injuri (NSSI) can be defined as the act of an individual who does not intend to die directly and intentionally damaging his or her body tissues. According to a study conducted by the Korean Ministry of Education in 2018, the NSSI is widely spreading among teenagers, with 7.9 percent of all middle school students and 6.4 percent of high school students reporting experience in NSSI. As such, it is understood that the first time of the NSSI is in adolescence. However, the NSSI may not start and stop at a certain time, but may last longer. However, despite the widespread prevalence of NSSI among teenagers, little is known about the process and maintenance of NSSI college students on a continuous development basis. Korea's NSSI research trends are mainly focused on individual internal vulnerabilities (high levels of painful emotions/awareness, lack of pain tolerance) and interpersonal vulnerabilities (poor communication skills and social problem solving), and little studies have been done on individuals' unique characteristics and environmental factors such as substrate or environmental vulnerability factors. In particular, environmental factors are associated with the occurrence of NSSI by acting as a vulnerability factor that can interfere with the emotional control of individuals, whereas individual factors play a more direct role by contributing to the maintenance of NSSI, so it is more important to consider this for personal environmental involvement in NSSI. This study focused on the Fight-Flight-Freeze System as a factor in the defensive avoidance system of Reward Sensitivity in individual factors. Also, Environmental factors include the level of expressed emotion in family. Wedig and Nock (2007) said that if parents with a self-critical cognitive style take the form of criticizing their children, the experience of NSSI increases. The high level of parental criticism is related to the increasing frequency of NSSI acts as well as to serious levels of NSSI. If the normal coping mechanism fails to control emotions, people want to overcome emotional difficulties even through NSSI, and emotional disturbances experienced by individuals within an unsupported social relationship increase vulnerability to NSSI. Based on these theories, this study is to find ways to prevent NSSI and intervene in counseling effectively by verifying the differences between the characteristics experienced NSSI persons and non-experienced NSSI persons. Therefore, the purpose of this research was to examine the relationship of Fight-Flight-Freeze System (FFFS), level of expressed emotion in family and emotion regulation difficulties, comparing those who experienced Non-Suicidal Self-Injury (NSSI) with those who did not experienced Non-Suicidal Self-Injury (NSSI). The data were collected from university students in Seoul Korea and Gyeonggi-do province. 99 subjects were experienced student of NSSI, while 375 were non- experienced student of NSSI. The results of this study are as follows. First, the result of t-test indicated that NSSI attempters showed a significant difference in fight-flight-freeze system, level of expressed emotion and emotion regulation difficulties, compared with non-attempters. Second, fight-flight-freeze system, level of expressed emotion in family and emotion regulation difficulties of NSSI attempters showed a significant difference in correlation. The correlation was significant only freeze system of fight-flight-freeze system, Level of expressed emotion in family and emotion regulation difficulties. Third, freeze system and level of expressed emotion in family predicted emotion regulation difficulties of NSSI attempters. Fight-freeze system and level of expressed emotion in family predicted emotion regulation difficulties of non-NSSI attempters. Lastly, Practical implications for counselors and limitations of this study are discussed.

Keywords: fight-flight-freeze system, level of expressed emotion in family, emotion regulation difficulty, non-suicidal self injury

Procedia PDF Downloads 87
1397 Organization of the Purchasing Function for Innovation

Authors: Jasna Prester, Ivana Rašić Bakarić, Božidar Matijević

Abstract:

Various prominent scholars and substantial practitioner-oriented literature on innovation orientation have shown positive effects on firm performance. There is a myriad of factors that influence and enhance innovation but it has been found in the literature that new product innovations accounted for an average of 14 percent of sales revenues for all firms. If there is one thing that has changed in innovation management during the last decade, it is the growing reliance on external partners. As a consequence, a new task for purchasing arises, as firms need to understand which suppliers actually do have high potential contributing to the innovativeness of the firm and which do not. Purchasing function in an organization is extremely important as it deals on an average of 50% or more of a firm's expenditures. In the nineties the purchasing department was largely seen as a transaction-oriented, clerical function but today purchasing integration provides a formal interface mechanism between purchasing and other firm functions that services other functions within the company. Purchasing function has to be organized differently to enable firm innovation potential. However, innovations are inherently risky. There are behavioral risk (that some partner will take advantage of the other party), technological risk in terms of complexity of products and processes of manufacturing and incoming materials and finally market risks, which in fact judge the value of the innovation. These risks are investigated in this work since it has been found in the literature that the higher the technological risk, higher will be the centralization of the purchasing function as an interface with other supply chain members. Most researches on organization of purchasing function were done by case study analysis of innovative firms. This work actually tends to prove or discard results found in the literature based on case study method. A large data set of 1493 companies, from 25 countries collected in the GMRG 4 survey served as a basis for analysis.

Keywords: purchasing function organization, innovation, technological risk, GMRG 4 survey

Procedia PDF Downloads 463
1396 An Empirical Study on the Impact of Peace in Tourists' Country of Origin on Their Travel Behavior

Authors: Claudia Seabra, Elisabeth Kastenholz, José Luís Abrantes, Manuel Reis

Abstract:

In a world of increasing mobility and global risks, terrorism has, in a perverse way, capitalized on contemporaneous society’s growing interest in travel to explore a world whose national boundaries and distances have decreased. Terrorists have identified the modern tourist flows originated from the economically more developed countries as new appealing targets so as to: i) call attention to the causes they defend and ii) destroy a country’s foundations of tourism, with the final aim of disrupting the economic and consequently social fabric of the affected countries. The present study analyses sensitivity towards risk and travel behaviors in international travel amongst a sample of 600 international tourists from 49 countries travelling by air. Specifically, the sample was segmented according to the Global Peace Index. This index defines country profiles regarding the levels of peace. The indicators used are established over three broad themes: i) ongoing domestic and international conflict; ii) societal safety and security; and iii) militarisation. Tourists were segmented, according to their country of origin, in different levels of peacefulness. Several facets of travel behavior were evaluated, namely motivations, attitude towards trip planning, quality perception and perceived value of the trip. Also factors related with risk perception were evaluated, specifically terrorism risk perception during the trip, unsafety sensation as well as importance attributed to safety in travel. Results contribute to our understanding of the role of previous exposure to the lack of peace and safety at home in the international tourists behaviors, which is further discussed in terms of tourism management and marketing implications which should particularly interest tourism services and destinations more affected by terrorism, war, political turmoil, crime and other safety risks.

Keywords: terrorism, tourism, safety, risk perception

Procedia PDF Downloads 419
1395 The Types of Annuities with Flexible Premium

Authors: Deniz Ünal Özpalamutcu, Burcu Altman

Abstract:

Actuaria uses mathematics, statistic and financial information when analyzing the financial impacts of uncertainties, risks, insurance and pension related issues. In other words, it deals with the likelihood of potential risks, their financial impacts and especially the financial measures. Handling these measures require some long-term payment and investments. So, it is obvious it is inevitable to plan the periodic payments with equal time intervals considering also the changing value of money over time. These series of payment made specific intervals of time is called annuity or rant. In literature, rants are classified based on start and end dates, start times, payments times, payments amount or frequency. Classification of rants based on payment amounts changes based on the constant, descending or ascending payment methods. The literature about handling the annuity is very limited. Yet in a daily life, especially in today’s world where the economic issues gained a prominence, it is very crucial to use the variable annuity method in line with the demands of the customers. In this study, the types of annuities with flexible payment are discussed. In other words, we focus on calculating payment amount of a period by adding a certain percentage of previous period payment was studied. While studying this problem, formulas were created considering both start and end period payments for cash value and accumulated. Also increase of each period payment by r interest rate each period payments calculated with previous periods increases. And the problem of annuities (rants) of which each period payment increased with previous periods’ increase by r interest rate has been analyzed. Cash value and accumulated value calculation of this problem were studied separately based on the period start/end and their relations were expressed by formulas.

Keywords: actuaria, annuity, flexible payment, rant

Procedia PDF Downloads 188
1394 Comparison of the Anthropometric Obesity Indices in Prediction of Cardiovascular Disease Risk: Systematic Review and Meta-analysis

Authors: Saeed Pourhassan, Nastaran Maghbouli

Abstract:

Statement of the problem: The relationship between obesity and cardiovascular diseases has been studied widely(1). The distribution of fat tissue gained attention in relation to cardiovascular risk factors during lang-time research (2). American College of Cardiology/American Heart Association (ACC/AHA) is widely and the most reliable tool to be used as a cardiovascular risk (CVR) assessment tool(3). This study aimed to determine which anthropometric index is better in discrimination of high CVR patients from low risks using ACC/AHA score in addition to finding the best index as a CVR predictor among both genders in different races and countries. Methodology & theoretical orientation: The literature in PubMed, Scopus, Embase, Web of Science, and Google Scholar were searched by two independent investigators using the keywords "anthropometric indices," "cardiovascular risk," and "obesity." The search strategy was limited to studies published prior to Jan 2022 as full-texts in the English language. Studies using ACC/AHA risk assessment tool as CVR and those consisted at least 2 anthropometric indices (ancient ones and novel ones) are included. Study characteristics and data were extracted. The relative risks were pooled with the use of the random-effect model. Analysis was repeated in subgroups. Findings: Pooled relative risk for 7 studies with 16,348 participants were 1.56 (1.35-1.72) for BMI, 1.67(1.36-1.83) for WC [waist circumference], 1.72 (1.54-1.89) for WHR [waist-to-hip ratio], 1.60 (1.44-1.78) for WHtR [waist-to-height ratio], 1.61 (1.37-1.82) for ABSI [A body shape index] and 1.63 (1.32-1.89) for CI [Conicity index]. Considering gender, WC among females and WHR among men gained the highest RR. The heterogeneity of studies was moderate (α²: 56%), which was not decreased by subgroup analysis. Some indices such as VAI and LAP were evaluated just in one study. Conclusion & significance: This meta-analysis showed WHR could predict CVR better in comparison to BMI or WHtR. Some new indices like CI and ABSI are less accurate than WHR and WC. Among women, WC seems to be a better choice to predict cardiovascular disease risk.

Keywords: obesity, cardiovascular disease, risk assessment, anthropometric indices

Procedia PDF Downloads 82
1393 Information Security Risk Management in IT-Based Process Virtualization: A Methodological Design Based on Action Research

Authors: Jefferson Camacho Mejía, Jenny Paola Forero Pachón, Luis Carlos Gómez Flórez

Abstract:

Action research is a qualitative research methodology, which leads the researcher to delve into the problems of a community in order to understand its needs in depth and finally, to propose actions that lead to a change of social paradigm. Although this methodology had its beginnings in the human sciences, it has attracted increasing interest and acceptance in the field of information systems research since the 1990s. The countless possibilities offered nowadays by the use of Information Technologies (IT) in the development of different socio-economic activities have meant a change of social paradigm and the emergence of the so-called information and knowledge society. According to this, governments, large corporations, small entrepreneurs and in general, organizations of all kinds are using IT to virtualize their processes, taking them from the physical environment to the digital environment. However, there is a potential risk for organizations related with exposing valuable information without an appropriate framework for protecting it. This paper shows progress in the development of a methodological design to manage the information security risks associated with the IT-based processes virtualization, by applying the principles of the action research methodology and it is the result of a systematic review of the scientific literature. This design consists of seven fundamental stages. These are distributed in the three stages described in the action research methodology: 1) Observe, 2) Analyze and 3) Take actions. Finally, this paper aims to offer an alternative tool to traditional information security management methodologies with a view to being applied specifically in the planning stage of IT-based process virtualization in order to foresee risks and to establish security controls before formulating IT solutions in any type of organization.

Keywords: action research, information security, information technology, methodological design, process virtualization, risk management

Procedia PDF Downloads 138
1392 Development of a Predictive Model to Prevent Financial Crisis

Authors: Tengqin Han

Abstract:

Delinquency has been a crucial factor in economics throughout the years. Commonly seen in credit card and mortgage, it played one of the crucial roles in causing the most recent financial crisis in 2008. In each case, a delinquency is a sign of the loaner being unable to pay off the debt, and thus may cause a lost of property in the end. Individually, one case of delinquency seems unimportant compared to the entire credit system. China, as an emerging economic entity, the national strength and economic strength has grown rapidly, and the gross domestic product (GDP) growth rate has remained as high as 8% in the past decades. However, potential risks exist behind the appearance of prosperity. Among the risks, the credit system is the most significant one. Due to long term and a large amount of balance of the mortgage, it is critical to monitor the risk during the performance period. In this project, about 300,000 mortgage account data are analyzed in order to develop a predictive model to predict the probability of delinquency. Through univariate analysis, the data is cleaned up, and through bivariate analysis, the variables with strong predictive power are detected. The project is divided into two parts. In the first part, the analysis data of 2005 are split into 2 parts, 60% for model development, and 40% for in-time model validation. The KS of model development is 31, and the KS for in-time validation is 31, indicating the model is stable. In addition, the model is further validation by out-of-time validation, which uses 40% of 2006 data, and KS is 33. This indicates the model is still stable and robust. In the second part, the model is improved by the addition of macroeconomic economic indexes, including GDP, consumer price index, unemployment rate, inflation rate, etc. The data of 2005 to 2010 is used for model development and validation. Compared with the base model (without microeconomic variables), KS is increased from 41 to 44, indicating that the macroeconomic variables can be used to improve the separation power of the model, and make the prediction more accurate.

Keywords: delinquency, mortgage, model development, model validation

Procedia PDF Downloads 202
1391 Partnering with Stakeholders to Secure Digitization of Water

Authors: Sindhu Govardhan, Kenneth G. Crowther

Abstract:

Modernisation of the water sector is leading to increased connectivity and integration of emerging technologies with traditional ones, leading to new security risks. The convergence of Information Technology (IT) with Operation Technology (OT) results in solutions that are spread across larger geographic areas, increasingly consist of interconnected Industrial Internet of Things (IIOT) devices and software, rely on the integration of legacy with modern technologies, use of complex supply chain components leading to complex architectures and communication paths. The result is that multiple parties collectively own and operate these emergent technologies, threat actors find new paths to exploit, and traditional cybersecurity controls are inadequate. Our approach is to explicitly identify and draw data flows that cross trust boundaries between owners and operators of various aspects of these emerging and interconnected technologies. On these data flows, we layer potential attack vectors to create a frame of reference for evaluating possible risks against connected technologies. Finally, we identify where existing controls, mitigations, and other remediations exist across industry partners (e.g., suppliers, product vendors, integrators, water utilities, and regulators). From these, we are able to understand potential gaps in security, the roles in the supply chain that are most likely to effectively remediate those security gaps, and test cases to evaluate and strengthen security across these partners. This informs a “shared responsibility” solution that recognises that security is multi-layered and requires collaboration to be successful. This shared responsibility security framework improves visibility, understanding, and control across the entire supply chain, and particularly for those water utilities that are accountable for safe and continuous operations.

Keywords: cyber security, shared responsibility, IIOT, threat modelling

Procedia PDF Downloads 48
1390 Locating Potential Site for Biomass Power Plant Development in Central Luzon Philippines Using GIS-Based Suitability Analysis

Authors: Bryan M. Baltazar, Marjorie V. Remolador, Klathea H. Sevilla, Imee Saladaga, Loureal Camille Inocencio, Ma. Rosario Concepcion O. Ang

Abstract:

Biomass energy is a traditional source of sustainable energy, which has been widely used in developing countries. The Philippines, specifically Central Luzon, has an abundant source of biomass. Hence, it could supply abundant agricultural residues (rice husks), as feedstock in a biomass power plant. However, locating a potential site for biomass development is a complex process which involves different factors, such as physical, environmental, socio-economic, and risks that are usually diverse and conflicting. Moreover, biomass distribution is highly dispersed geographically. Thus, this study develops an integrated method combining Geographical Information Systems (GIS) and methods for energy planning; Multi-Criteria Decision Analysis (MCDA) and Analytical Hierarchy Process (AHP), for locating suitable site for biomass power plant development in Central Luzon, Philippines by considering different constraints and factors. Using MCDA, a three level hierarchy of factors and constraints was produced, with corresponding weights determined by experts by using AHP. Applying the results, a suitability map for Biomass power plant development in Central Luzon was generated. It showed that the central part of the region has the highest potential for biomass power plant development. It is because of the characteristics of the area such as the abundance of rice fields, with generally flat land surfaces, accessible roads and grid networks, and low risks to flooding and landslide. This study recommends the use of higher accuracy resource maps, and further analysis in selecting the optimum site for biomass power plant development that would account for the cost and transportation of biomass residues.

Keywords: analytic hierarchy process, biomass energy, GIS, multi-criteria decision analysis, site suitability analysis

Procedia PDF Downloads 391
1389 Domestic Rooftop Rainwater Harvesting for Prevention of Urban Flood in the Gomti Nagar Region of Lucknow, Uttar Pradesh, India

Authors: Rajkumar Ghosh

Abstract:

Urban flooding is a common occurrence throughout Asia. Almost every city is vulnerable to urban floods in some fashion, and city people are particularly vulnerable. Pluvial and fluvial flooding are the most prominent causes of urban flooding in the Gomti Nagar region of Lucknow, Uttar Pradesh, India. The pluvial flooding is regarded to be less damaging because it is caused by heavy rainfall, Seasonal rainfall fluctuations, water flows off concrete infrastructures, blockages of the drainage system, and insufficient drainage capacity or low infiltration capacity. However, this study considers pluvial flooding in Lucknow to be a significant source of cumulative damage over time, and the risks of such events are increasing as a result of changes in ageing infrastructure, hazard exposure, rapid urbanization, massive water logging and global warming. As a result, urban flooding has emerged as a critical field of study. The popularity of analytical approaches to project the spatial extent of flood dangers has skyrocketed. To address future urban flood resilience, more effort is needed to enhance both hydrodynamic models and analytical tools to simulate risks under present and forecast conditions. Proper urban planning with drainage system and ample space for high infiltration capacity are required to reduce urban flooding. A better India with no urban flooding is a pipe dream that can be realized by putting household rooftop rainwater collection systems in every structure. According to the current study, domestic RTRWHs are strongly recommended as an alternative source of water, as well as to prevent surface runoff and urban floods in this region of Lucknow, urban areas of India.

Keywords: rooftop rainwater harvesting, urban flood, pluvial flooding, fluvial flooding

Procedia PDF Downloads 57
1388 Investigating the Potential Use of Unsaturated Fatty Acids as Antifungal Crop Protective Agents

Authors: Azadeh Yasari, Michael Ganzle, Stephen Strelkov, Nuanyi Liang, Jonathan Curtis, Nat N. V. Kav

Abstract:

Pathogenic fungi cause significant yield losses and quality reductions to major crops including wheat, canola, and barley. Toxic metabolites produced by phytopathogenic fungi also pose significant risks to animal and human health. Extensive application of synthetic fungicides is not a sustainable solution since it poses risks to human, animal and environmental health. Unsaturated fatty acids may provide an environmentally friendly alternative because of their direct antifungal activity against phytopathogens as well as through the stimulation of plant defense pathways. The present study assessed the in vitro and in vivo efficacy of two hydroxy fatty acids, coriolic acid and ricinoleic acid, against the phytopathogens Fusarium graminearum, Pyrenophora tritici-repentis, Pyrenophora teres f. teres, Sclerotinia sclerotiorum, and Leptosphaeria maculans. Antifungal activity of coriolic acid and ricinoleic acid was evaluated using broth micro-dilution method to determine the minimum inhibitory concentration (MIC). Results indicated that both ricinoleic acid and coriolic acid showed antifungal activity against phytopathogens, with the strongest inhibitory activity against L. maculans, but the MIC varied greatly between species. An antifungal effect was observed for coriolic acid in vivo against pathogenic fungi of wheat and barley. This effect was not correlated to the in vitro activity because ricinoleic acid with equivalent in vitro antifungal activity showed no protective effect in vivo. Moreover, neither coriolic acid nor ricinoleic acid controlled fungal pathogens of canola. In conclusion, coriolic acid inhibits some phytopathogens in vivo and may have the potential to be an effective crop protection agent.

Keywords: coriolic acid, minimum inhibitory concentration, pathogenic fungi, ricinoleic acid

Procedia PDF Downloads 149
1387 Adoption of Risk and Insurance among Aquaculture Producers in Khuzestan Province, Iran

Authors: Kiyanoush Ghalavand

Abstract:

Aquaculture production is inherently a risky business, and farmers face a variety of weather, pest, disease, inptut supply, and market related risks. There are many factors out farmers control and unpredictable. Insurance has an important role in aquaculture production and is a tool to support farmers against threats. Investigation of factors affecting aquaculture farmers' adoption of aquaculture insurance strategy was the objective of this study. The purpose of this study was determining the related factors to adoption of insurance by aquaculture farmers in Khuzestan province, Iran. The research design was a descriptive and correlation surveying method. Aquaculture farmers in Khuzestan province were the target population for this study. A random sample of aquaculture selected (N=1830, n =139). The main result of the study reveled that exist correlation between the level of education, knowledge about purpose of insurance, participation in extension course, visit with insurance organization, and contact with extension agents to the adoption of insurance by aquaculture farmers were significantly positive. By using Bartlett's test and KMO test, determine whether research variables are appropriate for factor analysis (Sig = 0.000, Bartlett test = 0.9724, KMO = 0.74). The number of factors was determined using a split plot, eigenvalue, and percent of variance. An examination of the items and their factors loadings was used to understand the nature of the nine factors. To reduce subjectivity, items with factor loading equal to or greater than 0.5 were considered most important when factors were labeled. The nine factors were labeled (1) Extension and education activities, (2) Economical characteristics, (3) Governmental support, (4) communicational channel, (5) local leaders, (6) Facilitate in given damage (7) Motivation establishing, (8) Given damage in appropriate methods and (9) Appropriate activities by insurance organization. The results obtained from the factors analysis reveal that the nine factors explain percentage75 of the variation of the adoption of insurance of the adoption of insurance by aquaculture farmers in Khuzestan province.

Keywords: aquaculture farmers, insurance, factorial analysis, Khuzestan province, risks

Procedia PDF Downloads 131
1386 Operationalizing the Concept of Community Resilience through Community Capitals Framework-Based Index

Authors: Warda Ajaz

Abstract:

This study uses the ‘Community Capitals Framework’ (CCF) to develop a community resilience index that can serve as a useful tool for measuring resilience of communities in diverse contexts and backgrounds. CCF is an important analytical tool to assess holistic community change. This framework identifies seven major types of community capitals: natural, cultural, human, social, political, financial and built, and claims that the communities that have been successful in supporting healthy sustainable community and economic development have paid attention to all these capitals. The framework, therefore, proposes to study the community development through identification of assets in these major capitals (stock), investment in these capitals (flow), and the interaction between these capitals. Capital based approaches have been extensively used to assess community resilience, especially in the context of natural disasters and extreme events. Therefore, this study identifies key indicators for estimating each of the seven capitals through an extensive literature review and then develops an index to calculate a community resilience score. The CCF-based community resilience index presents an innovative way of operationalizing the concept of community resilience and will contribute toward decision-relevant research regarding adaptation and mitigation of community vulnerabilities to climate change-induced, as well as other adverse events.

Keywords: adverse events, community capitals, community resilience, climate change, economic development, sustainability

Procedia PDF Downloads 243
1385 A Systematic Review of Patient-Reported Outcomes and Return to Work after Surgical vs. Non-surgical Midshaft Humerus Fracture

Authors: Jamal Alasiri, Naif Hakeem, Saoud Almaslmani

Abstract:

Background: Patients with humeral shaft fractures have two different treatment options. Surgical therapy has lesser risks of non-union, mal-union, and re-intervention than non-surgical therapy. These positive clinical outcomes of the surgical approach make it a preferable treatment option despite the risks of radial nerve palsy and additional surgery-related risk. We aimed to evaluate patients’ outcomes and return to work after surgical vs. non-surgical management of shaft humeral fracture. Methods: We used databases, including PubMed, Medline, and Cochrane Register of Controlled Trials, from 2010 to January 2022 to search for potential randomised controlled trials (RCTs) and cohort studies comparing the patients’ related outcome measures and return to work between surgical and non-surgical management of humerus fracture. Results: After carefully evaluating 1352 articles, we included three RCTs (232 patients) and one cohort study (39 patients). The surgical intervention used plate/nail fixation, while the non-surgical intervention used a splint or brace procedure to manage shaft humeral fracture. The pooled DASH effects of all three RCTs at six (M.D: -7.5 [-13.20, -1.89], P: 0.009) I2:44%) and 12 months (M.D: -1.32 [-3.82, 1.17], p:0.29, I2: 0%) were higher in patients treated surgically than in non-surgical procedures. The pooled constant Murley score at six (M.D: 7.945[2.77,13.10], P: 0.003) I2: 0%) and 12 months (M.D: 1.78 [-1.52, 5.09], P: 0.29, I2: 0%) were higher in patients who received non-surgical than surgical therapy. However, pooled analysis for patients returning to work for both groups remained inconclusive. Conclusion: Altogether, we found no significant evidence supporting the clinical benefits of surgical over non-surgical therapy. Thus, the non-surgical approach remains the preferred therapeutic choice for managing shaft humeral fractures due to its lesser side effects.

Keywords: shaft humeral fracture, surgical treatment, Patient-related outcomes, return to work, DASH

Procedia PDF Downloads 76
1384 Salient Beliefs regarding Alcohol Reduction and Cessation among Thai Teenagers

Authors: Panrapee Suttiwan, Rewadee Watakakosol Arunya Tuicomepee, Sakkaphat T. Ngamake

Abstract:

Alcohol consumption ranks among the top six of health-risk behaviors that lead to disability and death among Thai teenagers. Underage drinkers have higher health risks than their non-drinking peers do. This study, therefore, aimed to explore salient beliefs of Thai teenagers with alcohol reduction and cessation based on the Theory of Planned Behaviour theoretical framework. Participants were 225 high-school and vocational school students, most of whom (60.9%) consumed alcohol almost daily (5-6 times / week), and one-third of whom (33.8%) reported habitual moderate drink. The average age was 16.5 (SD = 0.9), and the average age of the first use of alcohol was 13.7 (SD = 2.2). Instrument was an open-ended questionnaire that elicited beliefs about having alcohol reduction / cessation in the past 12 months. Findings revealed salient benefit beliefs of alcohol reduction / cessation among the teens such as improved physical and mental health, accident and violence avoidance, less sexual risks, money and time saving, better academic performance, and improved relationships. In contrast, the teens identified several disadvantage beliefs such as deteriorating health, social awkwardness, lack of little fun, excitement, and experience, physical uneasiness, stress, and lack of self-confidence. Salient normative groups for alcohol reduction / cessation included parents, elder relatives, siblings, close friends, teachers, boy / girlfriends, and seniors / juniors at school. Situations influencing alcohol reduction / cessation included quarrels with boy / girlfriends, family conflicts, peer pressure, partying and socializing, festive holidays and anniversary celebration, and visiting entertainment places, etc. This study provides empirical evidence that help to identify normative attitudes towards alcohol reduction / cessation and may thus be an important knowledge for public health campaigns seeking to reduce alcohol consumption in this population.

Keywords: alcohol consumption reduction, cessation, salient belief, Thai teenagers

Procedia PDF Downloads 299
1383 Secondary True to Life Polyethylene Terephthalate Nanoplastics: Obtention, Characterization, and Hazard Evaluation

Authors: Aliro Villacorta, Laura Rubio, Mohamed Alaraby, Montserrat López Mesas, Victor Fuentes-Cebrian, Oscar H. Moriones, Ricard Marcos, Alba Hernández.

Abstract:

Micro and nano plastics (MNPLs) are emergent environmental pollutants requiring urgent information on their potential risks to human health. One of the problems associated with the evaluation of their undesirable effects is the lack of real samples matching those resulting from the environmental degradation of plastic wastes. To such end, we propose an easy method to obtain polyethylene terephthalate nano plastics from water plastic bottles (PET-NPLs) but, in principle, applicable to any other plastic goods sources. An extensive characterization indicates that the proposed process produces uniform samples of PET-NPLs of around 100 nm, as determined by using a multi-angle and dynamic light scattering methodology. An important point to be highlighted is that to avoid the metal contamination resulting from methods using metal blades/burrs for milling, trituration, or sanding, we propose to use diamond burrs to produce metal-free samples. To visualize the toxicological profile of the produced PET-NPLs, we have evaluated their ability to be internalized by cells, their cytotoxicity, and their ability to induce oxidative stress and induce DNA damage. In this preliminary approach, we have detected their cellular uptake, but without the induction of significant biological effects. Thus, no relevant increases in toxicity, reactive oxygen species (ROS) induction, or DNA damage -as detected with the comet assay- have been observed. The use of real samples, as produced in this study, will generate relevant data in the discussion about the potential health risks associated with MNPLs exposures.

Keywords: nanoplastics, polyethylene terephthalate, physicochemical characterization, cell uptake, cytotoxicity

Procedia PDF Downloads 72
1382 Analysis of the Extreme Hydrometeorological Events in the Theorical Hydraulic Potential and Streamflow Forecast

Authors: Sara Patricia Ibarra-Zavaleta, Rabindranarth Romero-Lopez, Rosario Langrave, Annie Poulin, Gerald Corzo, Mathias Glaus, Ricardo Vega-Azamar, Norma Angelica Oropeza

Abstract:

The progressive change in climatic conditions worldwide has increased frequency and severity of extreme hydrometeorological events (EHE). Mexico is an example; this has been affected by the presence of EHE leaving economic, social and environmental losses. The objective of this research was to apply a Canadian distributed hydrological model (DHM) to tropical conditions and to evaluate its capacity to predict flows in a basin in the central Gulf of Mexico. In addition, the DHM (once calibrated and validated) was used to calculate the theoretical hydraulic power and the performance to predict streamflow before the presence of an EHE. The results of the DHM show that the goodness of fit indicators between the observed and simulated flows in the calibration process (NSE=0.83, RSR=0.021 and BIAS=-4.3) and validation: temporal was assessed at two points: point one (NSE=0.78, RSR=0.113 and BIAS=0.054) and point two (NSE=0.825, RSR=0.103 and BIAS=0.063) are satisfactory. The DHM showed its applicability in tropical environments and its ability to characterize the rainfall-runoff relationship in the study area. This work can serve as a tool for identifying vulnerabilities before floods and for the rational and sustainable management of water resources.

Keywords: HYDROTEL, hydraulic power, extreme hydrometeorological events, streamflow

Procedia PDF Downloads 307
1381 Resolving Conflicts of Constitutional Nature: Inside the Romanian Constitutional Court's Rulings on the Role and Competencies of the Public Authorities

Authors: Marieta Safta

Abstract:

The separation and balance of state powers constitute the basis of the rule of law. Observance of this principle requires framing of public authorities within the limits of competence established by the Constitution and the law, as well as loyal cooperation between them. From this perspective, the attribution of the constitutional courts for settling legal conflicts of a constitutional nature is an important tool for correcting the tendencies of violation of these limits, as well as for identifying solutions for situations that do not find an explicit regulation in the constitutional texts. The present study analyzes the jurisprudence of the Constitutional Court of Romania in the field of legal conflicts of a constitutional nature, revealing, together with the presentation of conflict situations, the vulnerabilities of the constitutional reference texts. It is also highlighted the role of the constitutional courts in the evolution of constitutional law institutions, even in terms of defining and redefining the regime of the forms of government. The conclusion of the study, beyond the subject of legal conflicts of a constitutional nature, bears on the necessity, even more so in this matter, of the certainty of jurisdictional interpretation. This certainty cannot be achieved as long as the interpretation is not authoritative; consequently, the assurance of the effectiveness of constitutional justice constitute a key issue of the rule of law.

Keywords: legal conflicts of constitutional nature, the Constitutional Court of Romania, the separation and balance of powers in the state, the effectiveness of constitutional justice

Procedia PDF Downloads 104
1380 European Drug Serialization: Securing the Pharmaceutical Drug Supply Chain from Counterfeiters

Authors: Vikram Chowdhary, Marek Vins

Abstract:

The profitability of the pharmaceutical drug business has attracted considerable interest, but it also faces significant challenges. Counterfeiters take advantage of the industry's vulnerabilities, which are further exacerbated by the globalization of the market, online trading, and complex supply chains. Governments and organizations worldwide are dedicated to creating a secure environment that ensures a consistent and genuine supply of pharmaceutical products. In 2019, the European authorities implemented regulation EU 2016/161 to strengthen traceability and transparency throughout the entire drug supply chain. This regulation requires the addition of enhanced security features, such as serializing items to the saleable unit level or individual packs. Despite these efforts, the incidents of pharmaceutical counterfeiting continue to rise globally, with regulated territories being particularly affected. This paper examines the effectiveness of the drug serialization system implemented by European authorities. By conducting a systematic literature review, we assess the implementation of drug serialization and explore the potential benefits of integrating emerging digital technologies, such as RFID and Blockchain, to improve traceability and management. The objective is to fortify pharmaceutical supply chains against counterfeiters and manipulators and ensure their security.

Keywords: blockchain, counterfeit drugs, EU drug serialization, pharmaceutical industry, RFID

Procedia PDF Downloads 76
1379 Enhancing Internet of Things Security: A Blockchain-Based Approach for Preventing Spoofing Attacks

Authors: Salha Abdullah Ali Al-Shamrani, Maha Muhammad Dhaher Aljuhani, Eman Ali Ahmed Aldhaheri

Abstract:

With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.

Keywords: internet of things, spoofing, IoT, access control, blockchain, raspberry pi

Procedia PDF Downloads 39
1378 Internal Concept of Integrated Health by Agrarian Society in Malagasy Highlands for the Last Century

Authors: O. R. Razanakoto, L. Temple

Abstract:

Living in a least developed country, the Malagasy society has a weak capacity to internalize progress, including health concerns. Since the arrival in the fifteenth century of Arabic script, called Sorabe, that was mainly dedicated to the aristocracy, until the colonial era beginning at the end of the nineteenth century and that has popularized the current usual script of the occidental civilization, the upcoming manuscripts that deal with apparent scientific or at least academic issue have been slowly established. So that, the Malagasy communities’ way of life is not well documented yet to allow a precise understanding of the major concerns, reason, and purpose of the existence of the farmers that compose them. A question arises, according to literature, how does Malagasy community that is dominated by agrarian society conceive the conservation of its wellbeing? This study aims to emphasize the scope and the limits of the « One Health » concept or of the Health Integrated Approach (HIA) that evolves at global scale, with regard to the specific context of local Malagasy smallholder farms. It is expected to identify how this society represents linked risks and the mechanisms between human health, animal health, plant health, and ecosystem health within the last 100 years. To do so, the framework to conduct systematic review for agricultural research has been deployed to access available literature. This task has been coupled with the reading of articles that are not indexed by online scientific search engine but that mention part of a history of agriculture and of farmers in Madagascar. This literature review has informed the interactions between human illnesses and those affecting animals and plants (breeded or wild) with any unexpected event (ecological or economic) that has modified the equilibrium of the ecosystem, or that has disturbed the livelihoods of agrarian communities. Besides, drivers that may either accentuate or attenuate the devasting effects of these illnesses and changes were revealed. The study has established that the reasons of human worries are not only physiological. Among the factors that regulate global health, food system and contemporary medicine have helped to the improvement of life expectancy from 55 to 63 years in Madagascar during the last 50 years. However, threats to global health are still occurring. New human or animal illnesses and livestock / plant pathology or enemies may also appear, whereas ancient illnesses that are supposed to have disappeared may be back. This study has highlighted how much important are the risks associated to the impact of unmanaged externalities that weaken community’s life. Many risks, and also solutions, come from abroad and have long term effects even though those happen as punctual event. Thus, a constructivist strategy is suggested to the « One Health » global concept throughout the record of local facts. This approach should facilitate the exploration of methodological pathways and the identification of relevant indicators for research related to HIA.

Keywords: agrarian system, health integrated approach, history, madagascar, resilience, risk

Procedia PDF Downloads 89
1377 A New Approach – A Numerical Assessment of Ground Strata Failure Potentials in Underground Mines

Authors: Omer Yeni

Abstract:

Ground strata failure or fall-of-ground is one of the underground mines' most prominent catastrophic risks. Mining companies use various methods/technics to prevent and critically control the associated risks. Some of those are safety by design, excavation methods, ground support, training, and competency, which all require quality control and assurance activities to confirm their efficiencies and performances and identify improvement opportunities through monitoring. However, many mining companies use quality control (QC) methods without quality assurance (QA), and they call it QA/QC together as a habit. From a simple definition, QC is a method of detecting defects, and QA is a method of preventing defects. Testing the final products at the end of the production line is not the way of proper QA/QC application but testing every component before assembly and the final product once completed. The installed ground support elements are some final products mining companies use to prevent ground strata failure. Testing the final product (i.e., rock bolt pull testing, shotcrete strength test, etc.) with QC methods only while those areas are already accessible; is not like testing an airplane full of passengers right after the production line or testing a car after the sale. Can only QC methods be called QA/QC? Can QA/QC activities be numerically scored for each critical control implemented to assess ground strata failure potential? Can numerical scores be used to identify Geotechnical Risk Rating (GRR) to determine the ground strata failure risk and its probability? This paper sets out to provide a specific QA/QC methodology to manage and confirm efficiencies and performances of the implemented critical controls and a numerical approach through the Geotechnical Risk Rating (GRR) process to assess ground strata failure risk to determine the gaps where proactive action is required to evaluate the probability of ground strata failures in underground mines.

Keywords: fall of ground, ground strata failure, QA/QC, underground

Procedia PDF Downloads 47
1376 The Determinants of Enterprise Risk Management: Literature Review, and Future Research

Authors: Sylvester S. Horvey, Jones Mensah

Abstract:

The growing complexities and dynamics in the business environment have led to a new approach to risk management, known as enterprise risk management (ERM). ERM is a system and an approach to managing the risks of an organization in an integrated manner to achieve the corporate goals and strategic objectives. Regardless of the diversities in the business environment, ERM has become an essential factor in managing individual and business risks because ERM is believed to enhance shareholder value and firm growth. Despite the growing number of literature on ERM, the question about what factors drives ERM remains limited. This study provides a comprehensive literature review of the main factors that contribute to ERM implementation. Google Scholar was the leading search engine used to identify empirical literature, and the review spanned between 2000 and 2020. Articles published in Scimago journal ranking and Scopus were examined. Thirteen firm characteristics and sixteen articles were considered for the empirical review. Most empirical studies agreed that firm size, institutional ownership, industry type, auditor type, industrial diversification, earnings volatility, stock price volatility, and internal auditor had a positive relationship with ERM adoption, whereas firm size, institutional ownership, auditor type, and type of industry were mostly seen be statistically significant. Other factors such as financial leverage, profitability, asset opacity, international diversification, and firm complexity revealed an inconclusive result. The growing literature on ERM is not without limitations; hence, this study suggests that further research should examine ERM determinants within a new geographical context while considering a new and robust way of measuring ERM rather than relying on a simple proxy (dummy) for ERM measurement. Other firm characteristics such as organizational culture and context, corporate scandals and losses, and governance could be considered determinants of ERM adoption.

Keywords: enterprise risk management, determinants, ERM adoption, literature review

Procedia PDF Downloads 145
1375 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology

Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar

Abstract:

The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.

Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology

Procedia PDF Downloads 94