Search results for: nuclear threats
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1609

Search results for: nuclear threats

1129 New Media Impact on Newspaper Readership

Authors: Umar Lawal Maradun

Abstract:

Newspapers are very important sources of information and are trusted by majority of populations in America, Latin America, Europe and many parts of the world. In the mid-1950s newspapers were at the forefront of providing people with information. However, in the 1970s television took over, while in the 1980s cable satellites became popular and in the 1990s the Internet and World Wide Web became major sources of media content and also major threats to the print media form. This paper looks at how newspaper readership has been affected by new media technology, especially the Internet. It uses empirical data by reviewing available literature within the context of change that is likely to threaten conventional media. It discovers that there is a growing decline in newspaper readership as a result of widespread use of the Internet. The decline in readership has been discovered to be a global phenomenon. The paper suggests strategies for the survival and revenue generation for print-based newspapers.

Keywords: Internet, media, newspaper, press

Procedia PDF Downloads 254
1128 Advanced Electron Microscopy Study of Fission Products in a TRISO Coated Particle Neutron Irradiated to 3.6 X 1021 N/cm² Fast Fluence at 1040 ⁰C

Authors: Haiming Wen, Isabella J. Van Rooyen

Abstract:

Tristructural isotropic (TRISO)-coated fuel particles are designed as nuclear fuel for high-temperature gas reactors. TRISO coating consists of layers of carbon buffer, inner pyrolytic carbon (IPyC), SiC, and outer pyrolytic carbon. The TRISO coating, especially the SiC layer, acts as a containment system for fission products produced in the kernel. However, release of certain metallic fission products across intact TRISO coatings has been observed for decades. Despite numerous studies, mechanisms by which fission products migrate across the coating layers remain poorly understood. In this study, scanning transmission electron microscopy (STEM), energy dispersive X-ray spectroscopy (EDS), high-resolution transmission electron microscopy (HRTEM) and electron energy loss spectroscopy (EELS) were used to examine the distribution, composition and structure of fission products in a TRISO coated particle neutron irradiated to 3.6 x 1021 n/cm² fast fluence at 1040 ⁰C. Precession electron diffraction was used to investigate characters of grain boundaries where specific fission product precipitates are located. The retention fraction of 110mAg in the investigated TRISO particle was estimated to be 0.19. A high density of nanoscale fission product precipitates was observed in the SiC layer close to the SiC-IPyC interface, most of which are rich in Pd, while Ag was not identified. Some Pd-rich precipitates contain U. Precipitates tend to have complex structure and composition. Although a precipitate appears to have uniform contrast in STEM, EDS indicated that there may be composition variations throughout the precipitate, and HRTEM suggested that the precipitate may have several parts different in crystal structure or orientation. Attempts were made to measure charge states of precipitates using EELS and study their possible effect on precipitate transport.

Keywords: TRISO particle, fission product, nuclear fuel, electron microscopy, neutron irradiation

Procedia PDF Downloads 265
1127 Artificial Intelligence and Governance in Relevance to Satellites in Space

Authors: Anwesha Pathak

Abstract:

With the increasing number of satellites and space debris, space traffic management (STM) becomes crucial. AI can aid in STM by predicting and preventing potential collisions, optimizing satellite trajectories, and managing orbital slots. Governance frameworks need to address the integration of AI algorithms in STM to ensure safe and sustainable satellite activities. AI and governance play significant roles in the context of satellite activities in space. Artificial intelligence (AI) technologies, such as machine learning and computer vision, can be utilized to process vast amounts of data received from satellites. AI algorithms can analyse satellite imagery, detect patterns, and extract valuable information for applications like weather forecasting, urban planning, agriculture, disaster management, and environmental monitoring. AI can assist in automating and optimizing satellite operations. Autonomous decision-making systems can be developed using AI to handle routine tasks like orbit control, collision avoidance, and antenna pointing. These systems can improve efficiency, reduce human error, and enable real-time responsiveness in satellite operations. AI technologies can be leveraged to enhance the security of satellite systems. AI algorithms can analyze satellite telemetry data to detect anomalies, identify potential cyber threats, and mitigate vulnerabilities. Governance frameworks should encompass regulations and standards for securing satellite systems against cyberattacks and ensuring data privacy. AI can optimize resource allocation and utilization in satellite constellations. By analyzing user demands, traffic patterns, and satellite performance data, AI algorithms can dynamically adjust the deployment and routing of satellites to maximize coverage and minimize latency. Governance frameworks need to address fair and efficient resource allocation among satellite operators to avoid monopolistic practices. Satellite activities involve multiple countries and organizations. Governance frameworks should encourage international cooperation, information sharing, and standardization to address common challenges, ensure interoperability, and prevent conflicts. AI can facilitate cross-border collaborations by providing data analytics and decision support tools for shared satellite missions and data sharing initiatives. AI and governance are critical aspects of satellite activities in space. They enable efficient and secure operations, ensure responsible and ethical use of AI technologies, and promote international cooperation for the benefit of all stakeholders involved in the satellite industry.

Keywords: satellite, space debris, traffic, threats, cyber security.

Procedia PDF Downloads 78
1126 Climate Change and Poverty Nexus

Authors: O. Babalola Oladapo, A. Igbatayo Samuel

Abstract:

Climate change and poverty are global issues which cannot be waved aside in welfare of the ever increasing population. The causes / consequences are far more elaborate in developing countries, including Nigeria, which poses threats to the existence of man and his environment. The dominant role of agriculture makes it obvious that even minor climate deteriorations can cause devastating socio-economic consequences. Policies to curb the climate change by reducing the consumption of fossil fuels like oil, gas or carbon compounds have significant economical impacts on the producers/suppliers of these fuels. Thus a unified political narrative that advances both agendas is needed, because their components of an environmental coin that needs to be addressed. The developed world should maintain a low-carbon growth & real commitment of 0.7% of gross national income, as aid to developing countries & renewable energy approach should be emphasized, hence global poverty combated.

Keywords: climate change, greenhouse gases, Nigeria, poverty

Procedia PDF Downloads 374
1125 Safety-Security Co-Engineering of Control Systems

Authors: Elena A. Troubitsyna

Abstract:

Designers of modern safety-critical control systems are increasingly relying on networking to provide the systems with advanced functionality and satisfy customer’s needs. However, networking nature of modern control systems also brings new technological challenges associated with ensuring system safety in the presence of openness and hence, potential security threats. In this paper, we propose a methodology that relies on systems-theoretic analysis to enable an integrated analysis of safety and security requirements of controlling software. We demonstrate how to create a safety case – a structured argument about system safety – with explicit representation of both safety and security goals. Our approach provides the designers with a systematic approach to analysing safety and security interdependencies while designing safety-critical control systems.

Keywords: controlling software, integrated analysis, security, safety-security co-engineering

Procedia PDF Downloads 497
1124 Cybersecurity Breaches and Audit Outcomes: An Analysis of Auditor Changes and Going Concern Opinions

Authors: Sara Dehaiman Alqahtani

Abstract:

This study investigates the effects of cybersecurity breaches on critical audit outcomes, specifically focusing on auditor changes, engagement partner rotations, and the issuance of going concern opinions. Utilizing an extensive dataset of U.S.-based firms spanning from 2006 to 2023, the research employs propensity score matching (PSM) to address selection bias and control for confounding variables. The analysis reveals that, contrary to conventional expectations, firms that experience cybersecurity breaches are less likely to change their audit firms and engagement partners. Additionally, these breached firms are less likely to receive going concern opinions from their auditors. However, an exception is noted within the technology sector, where breached firms show a higher propensity to switch auditors, potentially to demonstrate a commitment to enhanced cybersecurity measures. The findings suggest a strong preference for continuity in auditor-client relationships following cybersecurity incidents. This preference underscores the importance of auditors' existing knowledge of a firm's systems and controls, which is deemed valuable during periods of heightened risk. The study extends the existing literature by moving beyond the well-documented impact of breaches on audit fees to explore other significant dimensions of the auditor-client relationship. It challenges the traditional assumption that increased risk from breaches leads to higher auditor turnover or more conservative audit opinions, highlighting instead a tendency towards maintaining stability. Methodologically, the research leverages PSM to create a balanced comparison between breached and non-breached firms, ensuring robustness in the findings. Logistic regression analyses further substantiate the associations between breaches and audit outcomes, controlling for various firm-specific characteristics such as size, financial performance, and industry classification. Supplemental analyses explore additional factors, including litigation risk, breach frequency, and industry-specific responses, providing a nuanced understanding of the dynamics at play. The study’s main contributions are threefold. First, it broadens the scope of research on cybersecurity breaches by examining their impact on auditor changes and going concern opinions, areas previously underexplored. Second, it offers empirical evidence that breached firms tend to retain their auditors and engagement partners, suggesting that continuity is valued over potential audit quality improvements through auditor changes. Third, it highlights sector-specific behaviors, particularly within the technology industry, where breaches do lead to higher auditor turnover, indicating industry-specific risk management strategies. Implications of this research are significant for auditors, clients, and regulators. Auditors may need to enhance their risk assessment frameworks to better incorporate cybersecurity risks, ensuring that audit practices remain robust in the face of evolving cyber threats. Clients should evaluate the benefits of retaining existing auditors against the potential advantages of engaging new auditors who might offer fresh perspectives and specialized cybersecurity expertise. Regulators might consider updating auditing standards to more explicitly address cybersecurity risks, ensuring that such threats are adequately reflected in audit procedures and disclosures. Overall, this study provides a comprehensive analysis of how cybersecurity breaches influence audit outcomes, revealing a preference for auditor continuity and questioning whether current auditing frameworks sufficiently account for cyber risks. By highlighting these trends, the research calls for a reassessment of audit practices and regulatory standards to better address the complexities introduced by the increasing prevalence of cyber threats in the digital age.

Keywords: cybersecurity breaches, auditor changes, engagement partner rotations, going concern opinions, auditor-client relationships, audit risk assessment

Procedia PDF Downloads 12
1123 Strategic Workplace Security: The Role of Malware and the Threat of Internal Vulnerability

Authors: Modesta E. Ezema, Christopher C. Ezema, Christian C. Ugwu, Udoka F. Eze, Florence M. Babalola

Abstract:

Some employees knowingly or unknowingly contribute to loss of data and also expose data to threat in the process of getting their jobs done. Many organizations today are faced with the challenges of how to secure their data as cyber criminals constantly devise new ways of attacking the organization’s secret data. However, this paper enlists the latest strategies that must be put in place in order to protect these important data from being attacked in a collaborative work place. It also introduces us to Advanced Persistent Threats (APTs) and how it works. The empirical study was conducted to collect data from the employee in data centers on how data could be protected from malicious codes and cyber criminals and their responses are highly considered to help checkmate the activities of malicious code and cyber criminals in our work places.

Keywords: data, employee, malware, work place

Procedia PDF Downloads 385
1122 Osteoprotegerin and Osteoprotegerin/TRAIL Ratio are Associated with Cardiovascular Dysfunction and Mortality among Patients with Renal Failure

Authors: Marek Kuźniewski, Magdalena B. Kaziuk , Danuta Fedak, Paulina Dumnicka, Ewa Stępień, Beata Kuśnierz-Cabala, Władysław Sułowicz

Abstract:

Background: The high prevalence of cardiovascular morbidity and mortality among patients with chronic kidney disease (CKD) is observed especially in those undergoing dialysis. Osteoprotegerin (OPG) and its ligands, receptor activator of nuclear factor kappa-B ligand (RANKL) and tumor necrosis factor-related apoptosis-inducing ligand (TRAIL) have been associated with cardiovascular complications. Our aim was to study their role as cardiovascular risk factors in stage 5 CKD patients. Methods: OPG, RANKL and TRAIL concentrations were measured in 69 hemodialyzed CKD patients and 35 healthy volunteers. In CKD patients, cardiovascular dysfunction was assessed with aortic pulse wave velocity (AoPWV), carotid artery intima-media thickness (CCA-IMT), coronary artery calcium score (CaSc) and N-terminal pro-B-type natriuretic peptide (NT-proBNP) serum concentration. Cardiovascular and overall mortality data were collected during a 7-years follow-up. Results: OPG plasma concentrations were higher in CKD patients comparing to controls. Total soluble RANKL was lower and OPG/RANKL ratio higher in patients. Soluble TRAIL concentrations did not differ between the groups and OPG/TRAIL ratio was higher in CKD patients. OPG and OPG/TRAIL positively predicted long-term mortality (all-cause and cardiovascular) in CKD patients. OPG positively correlated with AoPWV, CCA-IMT and NT-proBNP whereas OPG/TRAIL with AoPWV and NT-proBNP. Described relationships were independent of classical and non-classical cardiovascular risk factors, with exception of age. Conclusions: Our study confirmed the role of OPG as a biomarker of cardiovascular dysfunction and a predictor of mortality in stage 5 CKD. OPG/TRAIL ratio can be proposed as a predictor of cardiovascular dysfunction and mortality.

Keywords: osteoprotegerin, tumor necrosis factor-related apoptosis-inducing ligand, receptor activator of nuclear factor kappa-B ligand, hemodialysis, chronic kidney disease, cardiovascular disease

Procedia PDF Downloads 336
1121 Exposure to Ionizing Radiation Resulting from the Chernobyl Fallout and Childhood Cardiac Arrhythmia: A Population Based Study

Authors: Geraldine Landon, Enora Clero, Jean-Rene Jourdain

Abstract:

In 2005, the Institut de Radioprotection et de Sûreté Nucléaire (IRSN, France) launched a research program named EPICE (acronym for 'Evaluation of Pathologies potentially Induced by CaEsium') to collect scientific information on non-cancer effects possibly induced by chronic exposures to low doses of ionizing radiation with the view of addressing a question raised by several French NGOs related to health consequences of the Chernobyl nuclear accident in children. The implementation of the program was preceded by a pilot phase to ensure that the project would be feasible and determine the conditions for implementing an epidemiological study on a population of several thousand children. The EPICE program focused on childhood cardiac arrhythmias started in May 2009 for 4 years, in partnership with the Russian Bryansk Diagnostic Center. The purpose of this cross-sectional study was to determine the prevalence of cardiac arrhythmias in the Bryansk oblast (depending on the contamination of the territory and the caesium-137 whole-body burden) and to assess whether caesium-137 was or not a factor associated with the onset of cardiac arrhythmias. To address these questions, a study bringing together 18 152 children aged 2 to 18 years was initiated; each child received three medical examinations (ECG, echocardiography, and caesium-137 whole-body activity measurement) and some of them were given with a 24-hour Holter monitoring and blood tests. The findings of the study, currently submitted to an international journal justifying that no results can be given at this step, allow us to answer clearly to the issue of radiation-induced childhood arrhythmia, a subject that has been debated for many years. Our results will be certainly helpful for health professionals responsible for the monitoring of population exposed to the releases from the Fukushima Dai-ichi nuclear power plant and also useful for future comparative study in children exposed to ionizing radiation in other contexts, such as cancer radiation therapies.

Keywords: Caesium-137, cardiac arrhythmia, Chernobyl, children

Procedia PDF Downloads 245
1120 Thermal Instability in Solid under Irradiation

Authors: P. Selyshchev

Abstract:

Construction materials for nuclear facilities are operated under extreme thermal and radiation conditions. First of all, they are nuclear fuel, fuel assemblies, and reactor vessel. It places high demands on the control of their state, stability of their state, and their operating conditions. An irradiated material is a typical example of an open non-equilibrium system with nonlinear feedbacks between its elements. Fluxes of energy, matter and entropy maintain states which are far away from thermal equilibrium. The links that arise under irradiation are inherently nonlinear. They form the mechanisms of feed-backs that can lead to instability. Due to this instability the temperature of the sample, heat transfer, and the defect density can exceed the steady-state value in several times. This can lead to change of typical operation and an accident. Therefore, it is necessary to take into account the thermal instability to avoid the emergency situation. The point is that non-thermal energy can be accumulated in materials because irradiation produces defects (first of all these are vacancies and interstitial atoms), which are metastable. The stored energy is about energy of defect formation. Thus, an annealing of the defects is accompanied by releasing of non-thermal stored energy into thermal one. Temperature of the material grows. Increase of temperature results in acceleration of defect annealing. Density of the defects drops and temperature grows more and more quickly. The positive feed-back is formed and self-reinforcing annealing of radiation defects develops. To describe these phenomena a theoretical approach to thermal instability is developed via formalism of complex systems. We consider system of nonlinear differential equations for different components of microstructure and temperature. The qualitative analysis of this non-linear dynamical system is carried out. Conditions for development of instability have been obtained. Points of bifurcation have been found. Convenient way to represent obtained results is a set of phase portraits. It has been shown that different regimes of material state under irradiation can develop. Thus degradation of irradiated material can be limited by means of choice appropriate kind of evolution of materials under irradiation.

Keywords: irradiation, material, non-equilibrium state, nonlinear feed-back, thermal instability

Procedia PDF Downloads 268
1119 Ground Water Sustainable Management in Ethiopia, Africa

Authors: Ebissa Gadissa Kedir

Abstract:

This paper presents the potential groundwater assessment and sustainable management in the selected study area. It is the most preferred water source in all climatic zones for its convenient availability, drought dependability, excellent quality, and low development cost. The rural areas, which account for more than 85% of the country's population, are encountered a shortage of potable water supply which can be solved by proper groundwater utilization. For the present study area, the groundwater potential is assessed and analysed. Thus, the study area falls in four potential groundwater zones ranging from poor to high. However, the current groundwater management practices in the study area are poor. Despite the pervasive and devastating challenges, immediate and proper responses have not yet been given to the problem. Thus, such frustrating threats and challenges have initiated the researcher to work in the project area.

Keywords: GW potential, GW management, GW sustainability, South gonder, Ethiopia

Procedia PDF Downloads 67
1118 Environmental Threats and Great Barrier Reef: A Vulnerability Assessment of World’s Best Tropical Marine Ecosystems

Authors: Ravi Kant Anand, Nikkey Keshri

Abstract:

The Great Barrier Reef of Australia is known for its beautiful landscapes and seascapes with ecological importance. This site was selected as a World Heritage site in 1981 and popularized internationally for tourism, recreational activities and fishing. But the major environmental hazards such as climate change, pollution, overfishing and shipping are making worst the site of marine ecosystem. Climate change is directly hitting on Great Barrier Reef through increasing level of sea, acidification of ocean, increasing in temperature, uneven precipitation, changes in the El Nino and increasing level of cyclones and storms. Apart from that pollution is second biggest factor which vanishing the coral reef ecosystem. Pollution including over increasement of pesticides and chemicals, eutrophication, pollution through mining, sediment runoff, loss of coastal wetland and oil spills. Coral bleaching is the biggest problem because of the environmental threatening agents. Acidification of ocean water reduced the formation of calcium carbonate skeleton. The floral ecosystem (including sea grasses and mangroves) of ocean water is the key source of food for fishes and other faunal organisms but the powerful waves, extreme temperature, destructive storms and river run- off causing the threat for them. If one natural system is under threat, it means the whole marine food web is affected from algae to whale. Poisoning of marine water through different polluting agents have been affecting the production of corals, breeding of fishes, weakening of marine health and increased in death of fishes and corals. In lieu of World Heritage site, tourism sector is directly affected and causing increasement in unemployment. Fishing sector also affected. Fluctuation in the temperature of ocean water affects the production of corals because it needs desolate place, proper sunlight and temperature up to 21 degree centigrade. But storms, El Nino, rise in temperature and sea level are induced for continuous reduction of the coral production. If we do not restrict the environmental problems of Great Barrier Reef than the best known ecological beauty with coral reefs, pelagic environments, algal meadows, coasts and estuaries, mangroves forests and sea grasses, fish species, coral gardens and the one of the best tourist spots will lost in upcoming years. My research will focus on the different environmental threats, its socio-economic impacts and different conservative measures.

Keywords: climate change, overfishing, acidification, eutrophication

Procedia PDF Downloads 375
1117 Approaches to Estimating the Radiation and Socio-Economic Consequences of the Fukushima Daiichi Nuclear Power Plant Accident Using the Data Available in the Public Domain

Authors: Dmitry Aron

Abstract:

Major radiation accidents carry not only the potential risks of negative consequences for public health due to exposure but also because of large-scale emergency measures were taken by authorities to protect the population, which can lead to unreasonable social and economic damage. It is technically difficult, as a rule, to assess the possible costs and damages from decisions on evacuation or resettlement of residents in the shortest possible time, since it requires specially prepared information systems containing relevant information on demographic, economic parameters and incoming data on radiation conditions. Foreign observers also face the difficulties in assessing the consequences of an accident in a foreign territory, since they usually do not have official and detailed statistical data on the territory of foreign state beforehand. Also, they can suppose the application of unofficial data from open Internet sources is an unreliable and overly labor-consuming procedure. This paper describes an approach to prompt creation of relational database that contains detailed actual data on economics, demographics and radiation situation at the Fukushima Prefecture during the Fukushima Daiichi NPP accident, received by the author from open Internet sources. This database was developed and used to assess the number of evacuated population, radiation doses, expected financial losses and other parameters of the affected areas. The costs for the areas with temporarily evacuated and long-term resettled population were investigated, and the radiological and economic effectiveness of the measures taken to protect the population was estimated. Some of the results are presented in the article. The study showed that such a tool for analyzing the consequences of radiation accidents can be prepared in a short space of time for the entire territory of Japan, and it can serve for the modeling of social and economic consequences for hypothetical accidents for any nuclear power plant in its territory.

Keywords: Fukushima, radiation accident, emergency measures, database

Procedia PDF Downloads 192
1116 The Impact of Tourism on the Intangible Cultural Heritage of Pilgrim Routes: The Case of El Camino de Santiago

Authors: Miguel Angel Calvo Salve

Abstract:

This qualitative and quantitative study will identify the impact of tourism pressure on the intangible cultural heritage of the pilgrim route of El Camino de Santiago (Saint James Way) and propose an approach to a sustainable touristic model for these Cultural Routes. Since 1993, the Spanish Section of the Pilgrim Route of El Camino de Santiago has been on the World Heritage List. In 1994, the International Committee on Cultural Routes (CIIC-ICOMOS) initiated its work with the goal of studying, preserving, and promoting the cultural routes and their significance as a whole. Another ICOMOS group, the Charter on Cultural Routes, pointed out in 2008 the importance of both tangible and intangible heritage and the need for a holistic vision in preserving these important cultural assets. Tangible elements provide a physical confirmation of the existence of these cultural routes, while the intangible elements serve to give sense and meaning to it as a whole. Intangible assets of a Cultural Route are key to understanding the route's significance and its associated heritage values. Like many pilgrim routes, the Route to Santiago, as the result of a long evolutionary process, exhibits and is supported by intangible assets, including hospitality, cultural and religious expressions, music, literature, and artisanal trade, among others. A large increase in pilgrims walking the route, with very different aims and tourism pressure, has shown how the dynamic links between the intangible cultural heritage and the local inhabitants along El Camino are fragile and vulnerable. Economic benefits for the communities and population along the cultural routes are commonly fundamental for the micro-economies of the people living there, substituting traditional productive activities, which, in fact, modifies and has an impact on the surrounding environment and the route itself. Consumption of heritage is one of the major issues of sustainable preservation promoted with the intention of revitalizing those sites and places. The adaptation of local communities to new conditions aimed at preserving and protecting existing heritage has had a significant impact on immaterial inheritance. Based on questionnaires to pilgrims, tourists and local communities along El Camino during the peak season of the year, and using official statistics from the Galician Pilgrim’s Office, this study will identify the risk and threats to El Camino de Santiago as a Cultural Route. The threats visible nowadays due to the impact of mass tourism include transformations of tangible heritage, consumerism of the intangible, changes of local activities, loss in the authenticity of symbols and spiritual significance, and pilgrimage transformed into a tourism ‘product’, among others. The study will also approach some measures and solutions to mitigate those impacts and better preserve this type of cultural heritage. Therefore, this study will help the Route services providers and policymakers to better preserve the Cultural Route as a whole to ultimately improve the satisfying experience of pilgrims.

Keywords: cultural routes, El Camino de Santiago, impact of tourism, intangible heritage

Procedia PDF Downloads 84
1115 Analysis on Cyber Threat Actors Targeting Automated Border Security Systems

Authors: Mirko Sailio

Abstract:

Border crossing automatization reduces required human resources in handling people crossing borders. As technology replaces and augments the work done by border officers, new cyber threats arise to threaten border security. This research analyses the current cyber threat actors and their capabilities. The analysis is conducted by gathering the threat actor data from a wide range of public sources. A model for a general border automatization system is presented, and its most significant cyber-security attributes are then compared to threat actor activity and capabilities in order to predict priorities in securing such systems. Organized crime and nation-state actors present the clearest threat to border cyber-security, and additional focus is given to their motivations and activities.

Keywords: border automation, cyber-security, threat actors, border cyber-security

Procedia PDF Downloads 204
1114 Protecting Privacy and Data Security in Online Business

Authors: Bilquis Ferdousi

Abstract:

With the exponential growth of the online business, the threat to consumers’ privacy and data security has become a serious challenge. This literature review-based study focuses on a better understanding of those threats and what legislative measures have been taken to address those challenges. Research shows that people are increasingly involved in online business using different digital devices and platforms, although this practice varies based on age groups. The threat to consumers’ privacy and data security is a serious hindrance in developing trust among consumers in online businesses. There are some legislative measures taken at the federal and state level to protect consumers’ privacy and data security. The study was based on an extensive review of current literature on protecting consumers’ privacy and data security and legislative measures that have been taken.

Keywords: privacy, data security, legislation, online business

Procedia PDF Downloads 106
1113 In vitro Characterization of Mice Bone Microstructural Changes by Low-Field and High-Field Nuclear Magnetic Resonance

Authors: Q. Ni, J. A. Serna, D. Holland, X. Wang

Abstract:

The objective of this study is to develop Nuclear Magnetic Resonance (NMR) techniques to enhance bone related research applied on normal and disuse (Biglycan knockout) mice bone in vitro by using both low-field and high-field NMR simultaneously. It is known that the total amplitude of T₂ relaxation envelopes, measured by the Carr-Purcell-Meiboom-Gill NMR spin echo train (CPMG), is a representation of the liquid phase inside the pores. Therefore, the NMR CPMG magnetization amplitude can be transferred to the volume of water after calibration with the NMR signal amplitude of the known volume of the selected water. In this study, the distribution of mobile water, porosity that can be determined by using low-field (20 MHz) CPMG relaxation technique, and the pore size distributions can be determined by a computational inversion relaxation method. It is also known that the total proton intensity of magnetization from the NMR free induction decay (FID) signal is due to the water present inside the pores (mobile water), the water that has undergone hydration with the bone (bound water), and the protons in the collagen and mineral matter (solid-like protons). Therefore, the components of total mobile and bound water within bone that can be determined by low-field NMR free induction decay technique. Furthermore, the bound water in solid phase (mineral and organic constituents), especially, the dominated component of calcium hydroxyapatite (Ca₁₀(OH)₂(PO₄)₆) can be determined by using high-field (400 MHz) magic angle spinning (MAS) NMR. With MAS technique reducing NMR spectral linewidth inhomogeneous broadening and susceptibility broadening of liquid-solid mix, in particular, we can conduct further research into the ¹H and ³¹P elements and environments of bone materials to identify the locations of bound water such as OH- group within minerals and bone architecture. We hypothesize that with low-field and high-field magic angle spinning NMR can provide a more complete interpretation of water distribution, particularly, in bound water, and these data are important to access bone quality and predict the mechanical behavior of bone.

Keywords: bone, mice bone, NMR, water in bone

Procedia PDF Downloads 177
1112 Contribution to the Study of the Use of Pesticides in the Regions of Tizi Ouzou

Authors: Ramdane Gaouir

Abstract:

Farmers in the two regions of Tizi-Ouzou, DBK and Tadmait, face different crop pests, namely, fungal diseases, insect attack as well as different types of deficiencies. To fight against all these threats, they resort to the use of a wide variety of chemicals. Our survey carried out in these two regions, aims to identify the different types of pesticides used, the method of management of the packaging generated by these phytosanitary products as well as the evaluation of the effect of these products on the farmers' health and the environment. The results obtained highlighted the use of two types of pesticides with a very wide application, namely fungicides and insecticides. The two most widely identified chemical families are neonicotoids and organophosphates, which are among the most toxic and persistent pesticides in the environment. The management method of packaging and the application of products by spraying reflect the lack of training and the unawareness of farmers vis-à-vis the impact of pesticides on their health and on the environment.

Keywords: farmers, crops, pesticides, fungicides, neonicotinoids, organochlorines

Procedia PDF Downloads 96
1111 Electromagnetic Assessment of Submarine Power Cable Degradation Using Finite Element Method and Sensitivity Analysis

Authors: N. Boutra, N. Ravot, J. Benoit, O. Picon

Abstract:

Submarine power cables used for offshore wind farms electric energy distribution and transmission are subject to numerous threats. Some of the risks are associated with transport, installation and operating in harsh marine environment. This paper describes the feasibility of an electromagnetic low frequency sensing technique for submarine power cable failure prediction. The impact of a structural damage shape and material variability on the induced electric field is evaluated. The analysis is performed by modeling the cable using the finite element method, we use sensitivity analysis in order to identify the main damage characteristics affecting electric field variation. Lastly, we discuss the results obtained.

Keywords: electromagnetism, finite element method, sensitivity analysis, submarine power cables

Procedia PDF Downloads 356
1110 Study on Network-Based Technology for Detecting Potentially Malicious Websites

Authors: Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park

Abstract:

Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.

Keywords: Advanced Persistent Threat (APT), malware, network security, network packet, exploit kits

Procedia PDF Downloads 368
1109 The Sense of Recognition of Muslim Women in Western Academia

Authors: Naima Mohammadi

Abstract:

The present paper critically reports on the emergency of Iranian international students in a large public university in Italy. Although the most sizeable diaspora of Iranians dates back to the 1979 revolution, a huge wave of Iranian female students travelled abroad after the Iranian Green Movement (2009) due to the intensification of gender discrimination and Islamization. To explore the experience of Iranian female students at an Italian public university, two complementary methods were adopted: a focus group and individual interviews. Focus groups yield detailed collective conversations and provide researchers with an opportunity to observe the interaction between participants, rather than between participant and researcher, which generates data. Semi-structured interviews allow participants to share their stories in their own words and speak about personal experiences and opinions. Research participants were invited to participate through a public call in a Telegram group of Iranian students. Theoretical and purposive sampling was applied to select participants. All participants were assured that full anonymity would be ensured and they consented to take part in the research. A two-hour focus group was held in English with participants in the presence and some online. They were asked to share their motivations for studying in Italy and talk about their experiences both within and outside the university context. Each of these interviews lasted from 45 to 60 minutes and was mostly carried out online and in Farsi. The focus group consisted of 8 Iranian female post-graduate students. In analyzing the data a blended approach was adopted, with a combination of deductive and inductive coding. According to research findings, although 9/11 was the beginning of the West’s challenges against Muslims, the nuclear threats of Islamic regimes promoted the toughest international sanctions against Iranians as a nation across the world. Accordingly, carrying an Iranian identity contributes to social, political, and economic exclusion. Research findings show that geopolitical factors such as international sanctions and Islamophobia, and a lack of reciprocity in terms of recognition, have created a sense of stigmatization for veiled and unveiled Iranian female students who are the largest groups of ‘non-European Muslim international students’ enrolled in Italian universities. Participants addressed how their nationality has devalued their public image and negatively impacted their self-confidence and self-realization in academia. They highlighted the experience of an unwelcoming atmosphere by different groups of people and institutes, such as receiving marked students’ badges, rejected bank account requests, failed visa processes, secondary security screening selection, and hyper-visibility of veiled students. This study corroborates the need for institutions to pay attention to geopolitical factors and religious diversity in student recruitment and provide support mechanisms and access to basic rights. Accordingly, it is suggested that Higher Education Institutions (HEIs) have a social and moral responsibility towards the discrimination and both social and academic exclusion of Iranian students.

Keywords: Iranian diaspora, female students, recognition theory, inclusive university

Procedia PDF Downloads 75
1108 A Strength Weaknesses Opportunities and Threats Analysis of Socialisation Externalisation Combination and Internalisation Modes in Knowledge Management Practice: A Systematic Review of Literature

Authors: Aderonke Olaitan Adesina

Abstract:

Background: The paradigm shift to knowledge, as the key to organizational innovation and competitive advantage, has made the management of knowledge resources in organizations a mandate. A key component of the knowledge management (KM) cycle is knowledge creation, which is researched to be the result of the interaction between explicit and tacit knowledge. An effective knowledge creation process requires the use of the right model. The SECI (Socialisation, Externalisation, Combination, and Internalisation) model, proposed in 1995, is attested to be a preferred model of choice for knowledge creation activities. The model has, however, been criticized by researchers, who raise their concern, especially about its sequential nature. Therefore, this paper reviews extant literature on the practical application of each mode of the SECI model, from 1995 to date, with a view to ascertaining the relevance in modern-day KM practice. The study will establish the trends of use, with regards to the location and industry of use, and the interconnectedness of the modes. The main research question is, for organizational knowledge creation activities, is the SECI model indeed linear and sequential? In other words, does the model need to be reviewed in today’s KM practice? The review will generate a compendium of the usage of the SECI modes and propose a framework of use, based on the strength weaknesses opportunities and threats (SWOT) findings of the study. Method: This study will employ the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology to investigate the usage and SWOT of the modes, in order to ascertain the success, or otherwise, of the sequential application of the modes in practice from 1995 to 2019. To achieve the purpose, four databases will be explored to search for open access, peer-reviewed articles from 1995 to 2019. The year 1995 is chosen as the baseline because it was the year the first paper on the SECI model was published. The study will appraise relevant peer-reviewed articles under the search terms: SECI (or its synonym, knowledge creation theory), socialization, externalization, combination, and internalization in the title, abstract, or keywords list. This review will include only empirical studies of knowledge management initiatives in which the SECI model and its modes were used. Findings: It is expected that the study will highlight the practical relevance of each mode of the SECI model, the linearity or not of the model, the SWOT in each mode. Concluding Statement: Organisations can, from the analysis, determine the modes of emphasis for their knowledge creation activities. It is expected that the study will support decision making in the choice of the SECI model as a strategy for the management of organizational knowledge resources, and in appropriating the SECI model, or its remodeled version, as a theoretical framework in future KM research.

Keywords: combination, externalisation, internalisation, knowledge management, SECI model, socialisation

Procedia PDF Downloads 358
1107 Software Quality Assurance in Network Security using Cryptographic Techniques

Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar

Abstract:

The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.

Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography

Procedia PDF Downloads 734
1106 Systemic Approach to Risk Measurement of Drainage Systems in Urban Areas

Authors: Jadwiga Królikowska, Andrzej Królikowski, Jarosław Bajer

Abstract:

The work delineates the threats of maladjustment of the capacity of rain canals, designed and built in the early 20th century, in connection to heavy rainfall, especially in summer. This is the cause of the so called 'urban floods.' It directly relates to fierce raise of paving in the cities. Resolving this problem requires a change in philosophy of draining the rainfall by wider use of retention, infiltration and usage of rainwater. In systemic approach to managing the safety of urban drainage systems the risk, which is directly connected to safety failures, has been accepted as a measure. The risk level defines the probability of occurrence of losses greater than the ones forecast for a given time frame. The procedure of risk modelling, enabling its numeric analysis by using appropriate weights, is a significant issue in this paper.

Keywords: risk management, drainage system, urban areas, urban floods

Procedia PDF Downloads 361
1105 Social Contact Patterns among School-Age Children in Taiwan

Authors: Dih Ling Luh, Zhi Shih You, Szu Chieh Chen

Abstract:

Social contact patterns among school-age children play an important role in the epidemiology of infectious disease. Since many of the greatest threats to human health are spread by direct person-to-person contact, understanding the spread of respiratory pathogens and patterns of human interactions are public health priorities. This study used social contact diaries to compare the number of contacts per day per participant across different flu/non-flu seasons and weekend/weekday. We also present contact properties such as sex, age, masking, setting, frequency, duration, and contact types among school-age children (grades 7–8). The sample size with pair-wise comparisons for the seasons (flu/non-flu) and stratification by location were 54 and 83, respectively. There was no difference in the number of contacts during the flu and non-flu seasons, with averages of 16.3 (S.D. = 12.9) and 14.6 (S.D. = 9.5) people, respectively. Weekdays were associated with 23% and 28% more contacts than weekend days during the non-flu and flu seasons, respectively (p < 0.001) (Wilcoxon signed-rank test).

Keywords: contact patterns, behavior, influenza, social mixing

Procedia PDF Downloads 346
1104 The Systemic Approach to Risk Measurement of Drainage Systems in Urban Areas

Authors: Jadwiga Królikowska, Andrzej Królikowski, Jarosław Bajer

Abstract:

The work delineates the threats of maladjustment of the capacity of rain canals, designed and built in the early 20th century, in connection to heavy rainfall, especially in summer. This is the cause of the so called 'urban floods.' It directly relates to fierce raise of paving in the cities. Resolving this problem requires a change in philosophy of draining the rainfall by wider use of retention, infiltration and usage of rainwater. In systemic approach to managing the safety of urban drainage systems the risk, which is directly connected to safety failures, has been accepted as a measure. The risk level defines the probability of occurrence of losses grater than the ones forecast for a given time frame. The procedure of risk modelling, enabling its numeric analysis by using appropriate weights, is a significant issue in this paper.

Keywords: drainage system, urban areas, risk measurement, systemic approach

Procedia PDF Downloads 295
1103 Management Opposition, Strikes, and Union Threats

Authors: Patrick Nüß

Abstract:

I estimate management opposition against unions in terms of hiring discrimination by a large scale field experiment in the German labor market. The results show that callback rates for union members decrease significantly in the presence of high sectoral union density and large firm size. I further explore how this effect varies with regional and sectoral labor dispute intensity and find that management opposition is stronger when a sector is exposed to an intense labor dispute. There is evidence that the observed management opposition can be explained by sectoral union threat effects. Sectors with lower hiring discrimination have lower coverage of collective agreements, and in the absence of a collective agreement, they are less likely to follow the collective agreement wage setting.

Keywords: trade unions, Industrial relations, management opposition, union threat, labor disputes, field experiments

Procedia PDF Downloads 185
1102 Cyber Attacks Management in IoT Networks Using Deep Learning and Edge Computing

Authors: Asmaa El Harat, Toumi Hicham, Youssef Baddi

Abstract:

This survey delves into the complex realm of Internet of Things (IoT) security, highlighting the urgent need for effective cybersecurity measures as IoT devices become increasingly common. It explores a wide array of cyber threats targeting IoT devices and focuses on mitigating these attacks through the combined use of deep learning and machine learning algorithms, as well as edge and cloud computing paradigms. The survey starts with an overview of the IoT landscape and the various types of attacks that IoT devices face. It then reviews key machine learning and deep learning algorithms employed in IoT cybersecurity, providing a detailed comparison to assist in selecting the most suitable algorithms. Finally, the survey provides valuable insights for cybersecurity professionals and researchers aiming to enhance security in the intricate world of IoT.

Keywords: internet of things (IoT), cybersecurity, machine learning, deep learning

Procedia PDF Downloads 34
1101 Nuclear Powered UAV for Surveillances and Aerial Photography

Authors: Rajasekar Elangopandian, Anand Shanmugam

Abstract:

Now-a-days for surveillances unmanned aerial vehicle plays a vital role. Not only for surveillances, aerial photography disaster management and the notice of earth behavior UAV1s envisages meticulously. To reduce the maintenance and fuel nuclear powered Vehicles are greater support. The design consideration is much important for the UAV manufacturing industry and Research and development agency. Eventually design is looking like a pentagon shaped fuselage and black rubber coated paint in order to escape from the enemy radar and other targets. The pentagon shape fuselage has large space to keep the mini nuclear reactor inside and the material is carbon – carbon fiber specially designed by the software called cosmol and hyper mesh 14.2. So the weight consideration will produce the positive result for productivity. The walls of the fuselage are coated with lead and protective shield. A double layer of W/Bi sheet is proposed for radiation protection at the energy range of 70 Kev to 90 Kev. The designed W/bi sheet, only 0.14 mm thick and is 36% light. The properties of the fillers were determined from zeta potential and particle size measurements. The Exposes of the radiation can be attenuated by 3 ways such as minimizing exposure time, Maximizing distance from the radiation source and shielding the whole vehicle. The inside reactor will be switched ON when the UAV starts its cruise. The moderators and the control rods can be inserted by automation technique by newly developed software. The heat generated by the reactor will be used to run the turbine which is fixed inside the UAV called mini turbine with natural rubber composite Shaft radiation shield. Cooling system will be in two mode such as liquid and air cooled. Liquid coolant for the heat regeneration is ordinary water, liquid sodium, helium and the walls are made up of regenerative and radiation protective material. The other components like camera and arms bay will be located at the bottom of the UAV high are specially made products in order to escape from the radiation. They are coated with lead Pb and natural rubber composite material. This technique provides the long rang and endurance for eternal flight mission until we need any changeability of parts or product. This UAV has the special advantage of ` land on String` means it`ll land at electric line to charge the automated electronics. Then the fuel is enriched uranium (< 5% U - 235) contains hundreds of fuel pins. This technique provides eternal duty for surveillances and aerial photography. The landing of the vehicle is ease of operation likewise the takeoff is also easier than any other mechanism which present in nowadays. This UAV gives great immense and immaculate technology for surveillance and target detecting and smashing the target.

Keywords: mini turbine, liquid coolant for the heat regeneration, in order to escape from the radiation, eternal flight mission, it`ll land at electric line

Procedia PDF Downloads 410
1100 Absence of Malignancy in Oral Epithelial Cells from Individuals Occupationally Exposed to Organic Solvents Working in the Shoe Industry

Authors: B. González-Yebra, B. Flores-Nieto, P. Aguilar-Salinas, M. Preciado Puga, A. L. González Yebra

Abstract:

The monitoring of populations occupationally exposed to organic solvents has been an important issue for several shoe factories for years since the International Agency for Research on Cancer (IARC) has advised on the potential carcinogenic risk of chemicals related to occupations. In order to detect if exposition to organic solvents used in some Mexican shoe factories contributes to oral carcinogenesis, we performed monitoring in three factories. Occupational exposure was determined by using monitors 3M. Organic solvents were assessed by gas chromatography. Then, we recruited 30 shoe workers (30.2 ± 8.4 years) and 10 unexposed subjects (43.3 ± 11.2 years) for the micronuclei (MN) test and immunodetection of some cancer biomarkers (ki-67, p16, caspase-3) in scraped oral epithelial cells. Monitored solvents detected were acetone, benzene, hexane, methyl ethyl ketone, and toluene in acceptable levels according to Official Mexican Norm. We found by MN test higher incidence of nuclear abnormalities (karyorrhexis, pycnosis, karyolysis, condensed chromatin, and macronuclei) in the exposed group than the non-exposed group. On the other hand, we found, a negative expression for Ki-67 and p16 in exfoliated epithelial cells from exposed and non-exposed to organic solvents subjects. Only caspase-3 shown positive patter of expression in 9/30 (30%) exposed subjects, and we detected high karyolysis incidence in caspase-3 subjects (p = 0.021). The absence of expression of proliferation markers p16 and ki-67 and presence of apoptosis marker caspase-3 are indicating the absence of malignancy in oral epithelial cells and low risk for oral cancer. It is a fact that the MN test is a very effective method to detect nuclear abnormalities in exfoliated buccal cells from subjects that have been exposed to organic solvents in the shoe industry. However, in order to improve this tool and predict cancer risk is it is mandatory to implement complementary tests as other biomarkers that can help to detect malignancy in individuals occupationally exposed.

Keywords: biomarkers, oral cancer, organic solvents, shoe industries

Procedia PDF Downloads 136