Search results for: socially engineered attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1272

Search results for: socially engineered attacks

792 Ethereum Based Smart Contracts for Trade and Finance

Authors: Rishabh Garg

Abstract:

Traditionally, business parties build trust with a centralized operating mechanism, such as payment by letter of credit. However, the increase in cyber-attacks and malicious hacking has jeopardized business operations and finance practices. Emerging markets, owing to their higher banking risks and bigger presence of digital financing, are looking forward to technology-driven solutions, financial inclusion and innovative working paradigms. Blockchain has the potential to enhance transaction transparency and supply chain traceability. It has captured a vast landscape with 200 million crypto users worldwide. Fintech and blockchain products are popping up across brokerage, digital wallets, exchanges, post-trade clearance, settlement, middleware, infrastructure, and base protocols.

Keywords: blockchain, distributed ledger technology, decentralized applications, ethereum, smart contracts, trade finance

Procedia PDF Downloads 134
791 Investigation of Delamination Process in Adhesively Bonded Hardwood Elements under Changing Environmental Conditions

Authors: M. M. Hassani, S. Ammann, F. K. Wittel, P. Niemz, H. J. Herrmann

Abstract:

Application of engineered wood, especially in the form of glued-laminated timbers has increased significantly. Recent progress in plywood made of high strength and high stiffness hardwoods, like European beech, gives designers in general more freedom by increased dimensional stability and load-bearing capacity. However, the strong hygric dependence of basically all mechanical properties renders many innovative ideas futile. The tendency of hardwood for higher moisture sorption and swelling coefficients lead to significant residual stresses in glued-laminated configurations, cross-laminated patterns in particular. These stress fields cause initiation and evolution of cracks in the bond-lines resulting in: interfacial de-bonding, loss of structural integrity, and reduction of load-carrying capacity. Subsequently, delamination of glued-laminated timbers made of hardwood elements can be considered as the dominant failure mechanism in such composite elements. In addition, long-term creep and mechano-sorption under changing environmental conditions lead to loss of stiffness and can amplify delamination growth over the lifetime of a structure even after decades. In this study we investigate the delamination process of adhesively bonded hardwood (European beech) elements subjected to changing climatic conditions. To gain further insight into the long-term performance of adhesively bonded elements during the design phase of new products, the development and verification of an authentic moisture-dependent constitutive model for various species is of great significance. Since up to now, a comprehensive moisture-dependent rheological model comprising all possibly emerging deformation mechanisms was missing, a 3D orthotropic elasto-plastic, visco-elastic, mechano-sorptive material model for wood, with all material constants being defined as a function of moisture content, was developed. Apart from the solid wood adherends, adhesive layer also plays a crucial role in the generation and distribution of the interfacial stresses. Adhesive substance can be treated as a continuum layer constructed from finite elements, represented as a homogeneous and isotropic material. To obtain a realistic assessment on the mechanical performance of the adhesive layer and a detailed look at the interfacial stress distributions, a generic constitutive model including all potentially activated deformation modes, namely elastic, plastic, and visco-elastic creep was developed. We focused our studies on the three most common adhesive systems for structural timber engineering: one-component polyurethane adhesive (PUR), melamine-urea-formaldehyde (MUF), and phenol-resorcinol-formaldehyde (PRF). The corresponding numerical integration approaches, with additive decomposition of the total strain are implemented within the ABAQUS FEM environment by means of user subroutine UMAT. To predict the true stress state, we perform a history dependent sequential moisture-stress analysis using the developed material models for both wood substrate and adhesive layer. Prediction of the delamination process is founded on the fracture mechanical properties of the adhesive bond-line, measured under different levels of moisture content and application of the cohesive interface elements. Finally, we compare the numerical predictions with the experimental observations of de-bonding in glued-laminated samples under changing environmental conditions.

Keywords: engineered wood, adhesive, material model, FEM analysis, fracture mechanics, delamination

Procedia PDF Downloads 408
790 Computational Fluid Dynamics Analysis of an RC Airplane Wing Using a NACA 2412 Profile at Different Angle of Attacks

Authors: Huseyin Gokberk, Shian Gao

Abstract:

CFD analysis of the relationship between the coefficients of lift and drag with respect to the angle of attack on a NACA 2412 wing section of an RC plane is conducted. Both the 2D and 3D models are investigated with the turbulence model. The 2D analysis has a free stream velocity of 10m/s at different AoA of 0°, 2°, 5°, 10°, 12°, and 15°. The induced drag and drag coefficient increased throughout the changes in angles even after the critical angle had been exceeded, whereas the lift force and coefficient of lift increased but had a limit at the critical stall angle, which results in values to reduce sharply. Turbulence flow characteristics are analysed around the aerofoil with the additions caused due to a finite 3D model. 3D results highlight how wing tip vortexes develop and alter the flow around the wing with the effects of the tapered configuration.

Keywords: CFD, turbulence modelling, aerofoil, angle of attack

Procedia PDF Downloads 191
789 A Saltwater Battery Inspired by the Membrane Potential Found in Biological Cells

Authors: Ross Lee, Pritpal Singh, Andrew Jester

Abstract:

As the world transitions to a more sustainable energy economy, the deployment of energy storage technologies is expected to increase to develop a more resilient grid system. However, current technologies are associated with various environmental and safety issues throughout their entire lifecycle; therefore, new battery technology is necessary for grid applications to curtail these risks. Biological cells, such as human neurons and electrolytes in the electric eel, can serve as a more sustainable design template for a new bio-inspired (i.e., biomimetic) battery. Within biological cells, an electrochemical gradient across the cell membrane forms the membrane potential, which serves as the driving force for ion transport into/out of the cell, akin to the charging/discharging of a battery cell. This work serves as the first step to developing such a biomimetic battery cell, starting with the fabrication and characterization of ion-selective membranes to facilitate ion transport through the cell. Performance characteristics (e.g., cell voltage, power density, specific energy, roundtrip efficiency) for the cell under investigation are compared to incumbent battery technologies and biological cells to assess the readiness level for this emerging technology. Using a Na⁺-Form Nafion-117 membrane, the cell in this work successfully demonstrated behavior similar to human neurons; these findings will inform how cell components can be re-engineered to enhance device performance.

Keywords: battery, biomimetic, electrolytes, human neurons, ion-selective membranes, membrane potential

Procedia PDF Downloads 91
788 Cross-Sectional Associations between Deprivation Status and Physical Activity, Dietary Behaviours, Health-Related Variables, and Health-Related Quality of Life among Children Aged 9-11 Years

Authors: Maria Cardova

Abstract:

Aim and objectives: The purpose of this studywas to explore to what extent the deprivation statusinfluenced children’s physical activity, dietary behaviour, and health outcomes such as weight status. Background: The United Kingdom’s childhood obesity rates are currently ranked among the highest in Europe. North West England deals with highest rates of childhood obesity. Data from the UK Millennium Cohort Study suggested a deprivation gradient to childhood obesity in England, with obesity rates being the highest in the most deprived areas. Traditionally, it has been individual conception of health, but the contemporary stance is that health behaviours affecting obesity are influenced by a broad range of factors operating at multiple levels. According to socio-ecological model of health behaviour, differences in obesity rates and health outcomes are likely explained by differences in lifestyle behaviours including physical activity and diet behaviours. However, higher rates of obesity among deprived children are not due to physical inactivity, in fact, most socially disadvantaged children are the most physically active. Poor diet including high consumption of fast food and sugar-sweetened beverages and low consumption of fruit and vegetables was found to be the most prevalent among adolescents living in poverty. Methods: This study adopted quantitative approach. It consisted of combination of basic demographic data, anthropometry, and questionnaires. Children (N = 165, mean age = 10.04 years; 53.33% female; 46.66% male) completed survey packs during school day including KIDSCREEN, Youth Activity Profile, Beverage and Snack Questionnaire, and Child Body Image Scale questionnaires as well as had anthropometric measurements taken including Body mass index, waist circumference, weight, and height. Children’s deprivation status was based on the English Indices of Multiple Deprivation scores of the school they attended. Results: Children from more deprived areas had higher weight status, waist circumference. Deprivation status had also effect on some dimensions of the KIDSCREEN questionnaire, such as that those from more deprived areas felt less socially accepted and bullied by their peers, had worse feelings about themselves such as body image, and more difficulty with school and learning. Children from more deprived areas reported higher rates of physical activity and also differences in snack and fruit and vegetable intake than their more affluent peers. Conclusion: Results demonstrated that, children living in the most-deprived areas appear to be at greater risk of unfavourable health-related variables and behaviours and are exposed to home and neighbourhood environments that are less conducive to health-promoting behaviours compared to their peers from less deprived areas. These findings indicate that children living in highly deprived areas represent an important group for future interventions designed to promote health-behaviours that would impact on the quality of life of the child and other health variables such as weight status.

Keywords: children, dietary behaviour, health, obesity, physical Activity, weight Status

Procedia PDF Downloads 108
787 Production of Novel Antibiotics by Importing eryK and eryG Genes in Streptomyces fradiae

Authors: Neda Gegar Goshe, Hossein Rassi

Abstract:

The antibacterial properties of macrolide antibiotics (such as erythromycin and tylosin) depend ultimately on the glycosylation of otherwise inactive polyketide lactones. Among the sugars commonly found in such macrolides are various 6-deoxyhexoses including the 3-dimethylamino sugars mycaminose and desosamine (4-deoxymycaminose). Some macrolides (such as tylosin) possess multiple sugar moieties, whereas others (such as erythromycin) have two sugar substituents. Streptomyces fradiae is an ideal host for development of generic polyketide-overproducing strains because it contains three of the most common precursors-malonyl-CoA, methylmalonyl-CoA and ethylmalonyl-CoA-used by modular PKS, and is a host that is amenable to genetic manipulation. As patterns of glycosylation markedly influence a macrolide's drug activity, there is considerable interest in the possibility of using combinatorial biosynthesis to generate new pairings of polyketide lactones with sugars, especially 6-deoxyhexoses. Here, we report a successful attempt to alter the aminodeoxyhexose-biosynthetic capacity of Streptomyces fradiae (a producer of tylosin) by importing genes from the erythromycin producer Saccharopolyspora erythraea. The biotransformation of erythromycin-D into the desired major component erythromycin-A involves two final enzymatic reactions, EryK-catalyzed hydroxylation at the C-12 position of the aglycone and EryG-catalyzed O methylation at the C-3 position of macrose .This engineered S. fradiae produced substantial amounts of two potentially useful macrolides that had not previously been obtained by fermentation.

Keywords: Streptomyces fradiae, eryK and eryG genes, tylosin, antibiotics

Procedia PDF Downloads 309
786 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network

Authors: Kimaya Subhash Gaikwad, S. B. Waykar

Abstract:

The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.

Keywords: communication, MANET, OLSR, QoS

Procedia PDF Downloads 425
785 The Role of Social Media in the Rise of Islamic State in India: An Analytical Overview

Authors: Yasmeen Cheema, Parvinder Singh

Abstract:

The evolution of Islamic State (acronym IS) has an ultimate goal of restoring the caliphate. IS threat to the global security is main concern of international community but has also raised a factual concern for India about the regular radicalization of IS ideology among Indian youth. The incident of joining Arif Ejaz Majeed, an Indian as ‘jihadist’ in IS has set strident alarm in law & enforcement agencies. On 07.03.2017, many people were injured in an Improvised Explosive Device (IED) blast on-board of Bhopal Ujjain Express. One perpetrator of this incident was killed in encounter with police. But, the biggest shock is that the conspiracy was pre-planned and the assailants who carried out the blast were influenced by the ideology perpetrated by the Islamic State. This is the first time name of IS has cropped up in a terror attack in India. It is a red indicator of violent presence of IS in India, which is spreading through social media. The IS have the capacity to influence the younger Muslim generation in India through its brutal and aggressive propaganda videos, social media apps and hatred speeches. It is a well known fact that India is on the radar of IS, as well on its ‘Caliphate Map’. IS uses Twitter, Facebook and other social media platforms constantly. Islamic State has used enticing videos, graphics, and articles on social media and try to influence persons from India & globally that their jihad is worthy. According to arrested perpetrator of IS in different cases in India, the most of Indian youths are victims to the daydreams which are fondly shown by IS. The dreams that the Muslim empire as it was before 1920 can come back with all its power and also that the Caliph and its caliphate can be re-established are shown by the IS. Indian Muslim Youth gets attracted towards these euphemistic ideologies. Islamic State has used social media for disseminating its poisonous ideology, recruitment, operational activities and for future direction of attacks. IS through social media inspired its recruits & lone wolfs to continue to rely on local networks to identify targets and access weaponry and explosives. Recently, a pro-IS media group on its Telegram platform shows Taj Mahal as the target and suggested mode of attack as a Vehicle Born Improvised Explosive Attack (VBIED). Islamic State definitely has the potential to destroy the Indian national security & peace, if timely steps are not taken. No doubt, IS has used social media as a critical mechanism for recruitment, planning and executing of terror attacks. This paper will therefore examine the specific characteristics of social media that have made it such a successful weapon for Islamic State. The rise of IS in India should be viewed as a national crisis and handled at the central level with efficient use of modern technology.

Keywords: ideology, India, Islamic State, national security, recruitment, social media, terror attack

Procedia PDF Downloads 206
784 Production of Novel Antibiotics of Tylosin by Importing eryK and eryG Genes in Streptomyces fradiae

Authors: Neda Gegar Goshe, M. Moradi, Hossein Rassi

Abstract:

The antibacterial properties of macrolide antibiotics (such as erythromycin and tylosin) depend ultimately on the glycosylation of otherwise inactive polyketide lactones. Among the sugars commonly found in such macrolides are various 6-deoxyhexoses including the 3-dimethylamino sugars mycaminose and desosamine (4-deoxymycaminose). Some macrolides (such as tylosin) possess multiple sugar moieties, whereas others (such as erythromycin) have two sugar substituents. Streptomyces fradiae is an ideal host for development of generic polyketide-overproducing strains because it contains three of the most common precursors-malonyl-CoA, methylmalonyl-CoA and ethylmalonyl-CoA-used by modular PKS, and is a host that is amenable to genetic manipulation. As patterns of glycosylation markedly influence a macrolide's drug activity, there is considerable interest in the possibility of using combinatorial biosynthesis to generate new pairings of polyketide lactones with sugars, especially 6-deoxyhexoses. Here, we report a successful attempt to alter the aminodeoxyhexose-biosynthetic capacity of Streptomyces fradiae (a producer of tylosin) by importing genes from the erythromycin producer Saccharopolyspora erythraea. The bio transformation of erythromycin-D into the desired major component erythromycin-A involves two final enzymatic reactions, EryK-catalyzed hydroxylation at the C-12 position of the aglycone and EryG-catalyzed O methylation at the C-3 position of macrose. This engineered S. fradiae produced substantial amounts of two potentially useful macrolides that had not previously been obtained by fermentation.

Keywords: tylosin, eryK and eryG genes, streptomyces fradiae

Procedia PDF Downloads 330
783 In vitro Cytotoxicity Study on Silver Powders Synthesized via Different Routes

Authors: Otilia Ruxandra Vasile, Ecaterina Andronescu, Cristina Daniela Ghitulica, Bogdan Stefan Vasile, Roxana Trusca, Eugeniu Vasile, Alina Maria Holban, Carmen Mariana Chifiriuc, Florin Iordache, Horia Maniu

Abstract:

Engineered powders offer great promise in several applications, but little information is known about cytotoxicity effects. The aim of the current study was the synthesis and cytotoxicity examination of silver powders using pyrosol method at temperatures of 600°C, 650°C and 700°C, respectively sol-gel method and calcinations at 500°C, 600°C, 700°C and 800°C. We have chosen to synthesize and examine silver particles cytotoxicity due to its use in biological applications. The synthesized Ag powders were characterized from the structural, compositional and morphological point of view by using XRD, SEM, and TEM with SAED. In order to determine the influence of the synthesis route on Ag particles cytotoxicity, different sizes of micro and nanosilver synthesized powders were evaluated for their potential toxicity. For the study of their cytotoxicity, cell cycle and apoptosis have been done analysis through flow cytometry on human colon carcinoma cells and mesenchymal stem cells and through the MTT assay, while the viability and the morphological changes of the cells have been evaluated by using cloning studies. The results showed that the synthesized silver nanoparticles have displayed significant cytotoxicity effects on cell cultures. Our synthesized silver powders were found to present toxicity in a synthesis route and time-dependent manners for pyrosol synthesized nanoparticles; whereas a lower cytotoxicity has been measured after cells were treated with silver nanoparticles synthesized through sol-gel method.

Keywords: Ag, cytotoxicity, pyrosol method, sol-gel method

Procedia PDF Downloads 570
782 A Survey on Smart Security Mechanism Using Graphical Passwords

Authors: Aboli Dhanavade, Shweta Bhimnath, Rutuja Jumale, Ajay Nadargi

Abstract:

Security to any of our personal thing is our most basic need. It is not possible to directly apply that standard Human-computer—interaction approaches. Important usability goal for authentication system is to support users in selecting best passwords. Users often select text-passwords that are easy to remember, but they are more open for attackers to guess. The human brain is good in remembering pictures rather than textual characters. So the best alternative is being designed that is Graphical passwords. However, Graphical passwords are still immature. Conventional password schemes are also vulnerable to Shoulder-surfing attacks, many shoulder-surfing resistant graphical passwords schemes have been proposed. Next, we have analyzed the security and usability of the proposed scheme, and show the resistance of the proposed scheme to shoulder-surfing and different accidental logins.

Keywords: shoulder-surfing, security, authentication, text-passwords

Procedia PDF Downloads 340
781 A Survey on Genetic Algorithm for Intrusion Detection System

Authors: Prikhil Agrawal, N. Priyanka

Abstract:

With the increase of millions of users on Internet day by day, it is very essential to maintain highly reliable and secured data communication between various corporations. Although there are various traditional security imparting techniques such as antivirus software, password protection, data encryption, biometrics and firewall etc. But still network security has become the main issue in various leading companies. So IDSs have become an essential component in terms of security, as it can detect various network attacks and respond quickly to such occurrences. IDSs are used to detect unauthorized access to a computer system. This paper describes various intrusion detection techniques using GA approach. The intrusion detection problem has become a challenging task due to the conception of miscellaneous computer networks under various vulnerabilities. Thus the damage caused to various organizations by malicious intrusions can be mitigated and even be deterred by using this powerful tool.

Keywords: genetic algorithm (GA), intrusion detection system (IDS), dataset, network security

Procedia PDF Downloads 269
780 Role of Emotional Support and Work Motivation for Quality of Work Life on Balinese Working Women

Authors: Komang Rahayu Indrawati, Ni Wayan Sinthia Widiastuti, Ratna Dewi Santosa

Abstract:

Today the career of Balinese working women has been highly developed where able to work with loyalty and high professionalism. Career for a woman is one conscious choice and a call of conscience, which provides financial support for her family. Career for women can develop their own potencies, intellectually, and socially, so women feel that their role is meaningful and beneficial for herself and others. Emotional support becomes important to understand certainly for women who have multirole like Balinese working women to meet the demands of their role and also enhancing their work motivation and the quality of work life. This research used quantitative research method with questionnaires dissemination to 120 respondents and analyzed using Multiple Regression Analysis. The purpose of this study was to see the role of emotional support for work motivation and quality of work life in working Balinese women. The results of this study showed that emotional support and work motivation give a significant role in the quality of work life on Balinese working women.

Keywords: Balinese working women, emotional support, quality of work life, work motivation

Procedia PDF Downloads 178
779 Evaluation of Toxicity of Some Fungicides Against the Pathogen Fusarium sp.

Authors: M. Djekoun, H. Berrebah, M. R. Djebar

Abstract:

Fusarium wilt attacks the plants of major economic interest including wheat. This disease causes many problems for farmers and economic loss resulting are often very heavy. Chemical control is currently one of the most effective ways to fight against these diseases. In this study, the efficacy of three fungicides (tebuconazole, thiram and fludioxonil - difenoconazole mixture) was tested, in vitro, on the phytopathogenic Fusarium sp. isolated from seeds of wheat. The active ingredients were tested at different concentrations: 0.06, 1.39, 2.79, 5.58, and 11.16 mg/l for tebuconazole, 0.035, 0.052, 0.105, 0.21, and 0.42 mg/l for thiram and finally, for the mixture fludioxonil- difenoconazole 4 concentrations were tested : 0.05, 0.1, 0.5, and 1 mg/l. Toxicity responses were expressed as the effective concentration, which inhibits mycelial growth by 50%, (EC50). Of the three selected fungicides, thirame proved to be the most effective with EC50 value of the order of 0,15 mg/l followed by the mixture of fludioxonil- difenoconazole with 0,27 mg/l and finally tebuconazole with a value of 3.79 mg/l.

Keywords: Fusarium sp, thiram, tebuconazole, fludioxonil, difenoconazole, EC50

Procedia PDF Downloads 519
778 Software Quality Assurance in Network Security using Cryptographic Techniques

Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar

Abstract:

The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.

Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography

Procedia PDF Downloads 712
777 Evaluation of Gesture-Based Password: User Behavioral Features Using Machine Learning Algorithms

Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier

Abstract:

Graphical-based passwords have existed for decades. Their major advantage is that they are easier to remember than an alphanumeric password. However, their disadvantage (especially recognition-based passwords) is the smaller password space, making them more vulnerable to brute force attacks. Graphical passwords are also highly susceptible to the shoulder-surfing effect. The gesture-based password method that we developed is a grid-free, template-free method. In this study, we evaluated the gesture-based passwords for usability and vulnerability. The results of the study are significant. We developed a gesture-based password application for data collection. Two modes of data collection were used: Creation mode and Replication mode. In creation mode (Session 1), users were asked to create six different passwords and reenter each password five times. In replication mode, users saw a password image created by some other user for a fixed duration of time. Three different duration timers, such as 5 seconds (Session 2), 10 seconds (Session 3), and 15 seconds (Session 4), were used to mimic the shoulder-surfing attack. After the timer expired, the password image was removed, and users were asked to replicate the password. There were 74, 57, 50, and 44 users participated in Session 1, Session 2, Session 3, and Session 4 respectfully. In this study, the machine learning algorithms have been applied to determine whether the person is a genuine user or an imposter based on the password entered. Five different machine learning algorithms were deployed to compare the performance in user authentication: namely, Decision Trees, Linear Discriminant Analysis, Naive Bayes Classifier, Support Vector Machines (SVMs) with Gaussian Radial Basis Kernel function, and K-Nearest Neighbor. Gesture-based password features vary from one entry to the next. It is difficult to distinguish between a creator and an intruder for authentication. For each password entered by the user, four features were extracted: password score, password length, password speed, and password size. All four features were normalized before being fed to a classifier. Three different classifiers were trained using data from all four sessions. Classifiers A, B, and C were trained and tested using data from the password creation session and the password replication with a timer of 5 seconds, 10 seconds, and 15 seconds, respectively. The classification accuracies for Classifier A using five ML algorithms are 72.5%, 71.3%, 71.9%, 74.4%, and 72.9%, respectively. The classification accuracies for Classifier B using five ML algorithms are 69.7%, 67.9%, 70.2%, 73.8%, and 71.2%, respectively. The classification accuracies for Classifier C using five ML algorithms are 68.1%, 64.9%, 68.4%, 71.5%, and 69.8%, respectively. SVMs with Gaussian Radial Basis Kernel outperform other ML algorithms for gesture-based password authentication. Results confirm that the shorter the duration of the shoulder-surfing attack, the higher the authentication accuracy. In conclusion, behavioral features extracted from the gesture-based passwords lead to less vulnerable user authentication.

Keywords: authentication, gesture-based passwords, machine learning algorithms, shoulder-surfing attacks, usability

Procedia PDF Downloads 83
776 CybeRisk Management in Banks: An Italian Case Study

Authors: E. Cenderelli, E. Bruno, G. Iacoviello, A. Lazzini

Abstract:

The financial sector is exposed to the risk of cyber-attacks like any other industrial sector. Furthermore, the topic of CybeRisk (cyber risk) has become particularly relevant given that Information Technology (IT) attacks have increased drastically in recent years, and cannot be stopped by single organizations requiring a response at international and national level. IT risk is never a matter purely for the IT manager, although he clearly plays a key role. A bank's risk management function requires a thorough understanding of the evolving risks as well as the tools and practical techniques available to address them. Upon the request of European and national legislation regarding CybeRisk in the financial system, banks are therefore called upon to strengthen the operational model for CybeRisk management. This will require an important change with a more intense collaboration with the structures that deal with information security for the development of an ad hoc system for the evaluation and control of this type of risk. The aim of the work is to propose a framework for the management and control of CybeRisk that will bridge the gap in the literature regarding the understanding and consideration of CybeRisk as an integral part of business management. The IT function has a strong relevance in the management of CybeRisk, which is perceived mainly as operational risk, but with a positive tendency on the part of risk management to the identification of CybeRisk assessment methods that are increasingly complete, quantitative and able to better describe the possible impacts on the business. The paper provides answers to the research questions: Is it possible to define a CybeRisk governance structure able to support the comparison between risk and security? How can the relationships between IT assets be integrated into a cyberisk assessment framework to guarantee a system of protection and risks control? From a methodological point of view, this research uses a case study approach. The choice of “Monte dei Paschi di Siena” was determined by the specific features of one of Italy’s biggest lenders. It is chosen to use an intensive research strategy: an in-depth study of reality. The case study methodology is an empirical approach to explore a complex and current phenomenon that develops over time. The use of cases has also the advantage of allowing the deepening of aspects concerning the "how" and "why" of contemporary events, on which the scholar has little control. The research bases on quantitative data and qualitative information obtained through semi-structured interviews of an open-ended nature and questionnaires to directors, members of the audit committee, risk, IT and compliance managers, and those responsible for internal audit function and anti-money laundering. The added value of the paper can be seen in the development of a framework based on a mapping of IT assets from which it is possible to identify their relationships for purposes of a more effective management and control of cyber risk.

Keywords: bank, CybeRisk, information technology, risk management

Procedia PDF Downloads 224
775 Black-Box-Base Generic Perturbation Generation Method under Salient Graphs

Authors: Dingyang Hu, Dan Liu

Abstract:

DNN (Deep Neural Network) deep learning models are widely used in classification, prediction, and other task scenarios. To address the difficulties of generic adversarial perturbation generation for deep learning models under black-box conditions, a generic adversarial ingestion generation method based on a saliency map (CJsp) is proposed to obtain salient image regions by counting the factors that influence the input features of an image on the output results. This method can be understood as a saliency map attack algorithm to obtain false classification results by reducing the weights of salient feature points. Experiments also demonstrate that this method can obtain a high success rate of migration attacks and is a batch adversarial sample generation method.

Keywords: adversarial sample, gradient, probability, black box

Procedia PDF Downloads 70
774 Consumers’ Attitude towards Marketing Recreational Marijuana

Authors: Nizar Souiden, Riadh Ladhari

Abstract:

Like tobacco and alcohol, recreational marijuana falls under the umbrella of ‘sin’ industries’. Notwithstanding this general negative image surrounding marijuana use, some scholars argue that most of the widely believed claims made about recreational marijuana users are irrelevant and that marijuana use can even improve individuals’ decision-making. This study intends to shed light on this particular product category (i.e., marijuana) often overlooked or portrayed as taboo from a business view. More specifically, it investigates whether legalizing the consumption of recreational marijuana would be perceived as ethical and whether companies/organizations involved in the commercialization of this particular product would be held socially responsible. Based on primary data collected in Canada, this study aims to answer the following questions: 1) What moral thoughts do individuals hold with regard to the consumption of recreational marijuana? 2) How do these moral thoughts determine consumers’ attitude toward the consumption of recreational marijuana? Regardless of the legalization of recreational marijuana in some countries such as Canada, probing people’s opinions, and investigating their attitudes toward the consumption of recreational marijuana is of important interest to different stakeholders such as consumers, public organizations, private businesses, and trade associations.

Keywords: recreational marijuana, moral thoughts, ethics, attitude

Procedia PDF Downloads 112
773 Role of Islamic Economic System for Sustainabe Development

Authors: Yahaya Sulaiman, Ibrahim Muhammad Yakuba, Abubakar Usman

Abstract:

In this paper, we discuss that Sustainable Development Goals are in consonance with Islamic ethos and philosophy. Islam made emphasize on human well-being from spiritual, physiological, intellectual and economic perspectives. Islamic worldview and values framework strengthens moral consciousness, urge pro-social behaviour and engender environmental ethics which can help in influencing our attitudes towards meeting sustainable development challenges. Islamic social finance institutions like Zakat and Waqf can contribute towards scaling up efforts in commercially non-viable, but socially vital projects and programs. There is much potential for Islamic finance to promote sustainable economic development through such approaches as widening access to finance, financing infrastructure projects, and expanding the reach of Takaful. Real sector based productive enterprise in Islamic finance has positive implications for the ecosystem. Risk-sharing shifts the emphasis from credit-worthiness of the borrower to be placed on the value creation and economic viability of investments that create new wealth. Islamic social finance package can cater to the financially excluded households.

Keywords: assessment, Islamic, economic, sustainable, development

Procedia PDF Downloads 40
772 Democrat Support to Antiterorrism of USA from Hollywood: Homeland Series

Authors: Selman Selim Akyüz, Mete Kazaz

Abstract:

Since The First Gulf War, USA, “Leader of The Free World” has been in trouble with terror. The USA created a complexity in The Middle East and paid the price with terrorist attacks in homeland. USA has made serious mistakes in terms of antiterrorism and fight against its supporters. Democrats have repaired damages caused by the Republican Party's management. Old methods about antiterrorism have been slowly abandoned. Hollywood, too, has played an important part in this war. Sometimes, Hollywood became an unquestioned patriot, sometimes it cried for the death of American Soldiers far away. In this study, messages in The Homeland, broadcast in the USA and a lot of countries around the world, are analyzed in terms of Washington’s foreign policy and position of the CIA in the fight against antiterrorism. The series reflect an orientalist viewpoint and has been criticized for offensive policy against the government. Homeland wanted to offer a perspective for the USA to be the “Leader of The Free World” again but with a liberal-democrat approach, dialogue and rational intelligence methods.

Keywords: antiterrorism, CIA, homeland, USA

Procedia PDF Downloads 344
771 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures

Authors: L. Sellami, D. Idoughi, P. F. Tiako

Abstract:

Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.

Keywords: cloud computing, intrusion detection system, privacy, trust

Procedia PDF Downloads 290
770 Artificial Intelligence for Generative Modelling

Authors: Shryas Bhurat, Aryan Vashistha, Sampreet Dinakar Nayak, Ayush Gupta

Abstract:

As the technology is advancing more towards high computational resources, there is a paradigm shift in the usage of these resources to optimize the design process. This paper discusses the usage of ‘Generative Design using Artificial Intelligence’ to build better models that adapt the operations like selection, mutation, and crossover to generate results. The human mind thinks of the simplest approach while designing an object, but the intelligence learns from the past & designs the complex optimized CAD Models. Generative Design takes the boundary conditions and comes up with multiple solutions with iterations to come up with a sturdy design with the most optimal parameter that is given, saving huge amounts of time & resources. The new production techniques that are at our disposal allow us to use additive manufacturing, 3D printing, and other innovative manufacturing techniques to save resources and design artistically engineered CAD Models. Also, this paper discusses the Genetic Algorithm, the Non-Domination technique to choose the right results using biomimicry that has evolved for current habitation for millions of years. The computer uses parametric models to generate newer models using an iterative approach & uses cloud computing to store these iterative designs. The later part of the paper compares the topology optimization technology with Generative Design that is previously being used to generate CAD Models. Finally, this paper shows the performance of algorithms and how these algorithms help in designing resource-efficient models.

Keywords: genetic algorithm, bio mimicry, generative modeling, non-dominant techniques

Procedia PDF Downloads 131
769 Conversion of Glycerol to 3-Hydroxypropanoic Acid by Genetically Engineered Bacillus subtilis

Authors: Aida Kalantari, Boyang Ji, Tao Chen, Ivan Mijakovic

Abstract:

3-hydroxypropanoic acid (3-HP) is one of the most important biomass-derivable platform chemicals that can be converted into a number of industrially important compounds. There have been several attempts at production of 3-HP from renewable sources in cell factories, focusing mainly on Escherichia coli, Klebsiella pneumoniae, and Saccharomyces cerevisiae. Despite the significant progress made in this field, commercially exploitable large-scale production of 3-HP in microbial strains has still not been achieved. In this study, we investigated the potential of Bacillus subtilis to be used as a microbial platform for bioconversion of glycerol into 3-HP. Our recombinant B. subtilis strains overexpress the two-step heterologous pathway containing glycerol dehydratase and aldehyde dehydrogenase from various backgrounds. The recombinant strains harboring the codon-optimized synthetic pathway from K. pneumoniae produced low levels of 3-HP. Since the enzymes in the heterologous pathway are sensitive to oxygen, we had to perform our experiments in micro-aerobic conditions. Under these conditions, the cell produces lactate in order to regenerate NAD+, and we found the lactate production to be in competition with the production of 3-HP. Therefore, based on the in silico predictions, we knocked out the glycerol kinase (glpk), which in combination with growth on glucose, resulted in improving the 3-HP titer to 1 g/L and the removal of lactate. Cultivation of the same strain in an enriched medium improved the 3-HP titer up to 7.6 g/L. Our findings provide the first report of successful introduction of the biosynthetic pathway for conversion of glycerol into 3-HP in B. subtilis.

Keywords: bacillus subtilis, glycerol, 3-hydroxypropanoic acid, metabolic engineering

Procedia PDF Downloads 229
768 Researching the Impact of Entrepreneurship on Economic Growth: Making Traditional Products Suitable for Our Age with E-Commerce

Authors: GüLcan Keskin

Abstract:

In a globalizing world, it is more difficult for developing counties to gain a competitive advantage compared to developed countries. Entrepreneurship is an important factor for economic growth in developing countries. Entrepreneurship is not only in the success of an entrepreneur’s own businesses, but also plays an important role in regional and national development. Entrepreneurship is the factor that triggers change for the country to accelerate the creation, dissemination, and implementation of new thoughts, leading to the emergence of industries that supports economic growth and development as it increases productivity by creating a competitive advantage. Therefore, it is an important factor for countries to develop economically and socially in a global world. As the know-how of the local products belongs to the region, it is a value that should not be lost. Having know-how provides a competitive advantage to the region. On the other hand, traditional products can be tailored to today’s trade understanding to appeal to more audiences. The primary aim of the study is to examine the interaction mechanism between traditional products and innovation in the context of related literature. The second aim of the study is to show the effect the traditional products to competitive advantage.

Keywords: e-commerce, economic growth, entrepreneurship, traditional products

Procedia PDF Downloads 111
767 Increasing of Gain in Unstable Thin Disk Resonator

Authors: M. Asl. Dehghan, M. H. Daemi, S. Radmard, S. H. Nabavi

Abstract:

Thin disk lasers are engineered for efficient thermal cooling and exhibit superior performance for this task. However the disk thickness and large pumped area make the use of this gain format in a resonator difficult when constructing a single-mode laser. Choosing an unstable resonator design is beneficial for this purpose. On the other hand, the low gain medium restricts the application of unstable resonators to low magnifications and therefore to a poor beam quality. A promising idea to enable the application of unstable resonators to wide aperture, low gain lasers is to couple a fraction of the out coupled radiation back into the resonator. The output coupling gets dependent on the ratio of the back reflection and can be adjusted independently from the magnification. The excitation of the converging wave can be done by the use of an external reflector. The resonator performance is numerically predicted. First of all the threshold condition of linear, V and 2V shape resonator is investigated. Results show that the maximum magnification is 1.066 that is very low for high quality purposes. Inserting an additional reflector covers the low gain. The reflectivity and the related magnification of a 350 micron Yb:YAG disk are calculated. The theoretical model was based on the coupled Kirchhoff integrals and solved numerically by the Fox and Li algorithm. Results show that with back reflection mechanism in combination with increasing the number of beam incidents on disk, high gain and high magnification can occur.

Keywords: unstable resonators, thin disk lasers, gain, external reflector

Procedia PDF Downloads 392
766 A Study on Characteristics of Entrepreneur Spirit-Focus on Ventures

Authors: Do Jaesoo, Kim Kyoung Seok

Abstract:

Under the recent difficult economic conditions, a number of people are increasingly expecting fostering ventures as the breakthrough in economic recovery and thus more attention is socially paid to an entrepreneur spirit. However, even though the role of managers is very important for the success of a venture company, programs to cultivate their qualities and skills are quite insufficient. In recent years, programs to foster entrepreneurs and business men have proliferated, which are led mainly by national agencies, research institutions, and large corporations. However, these programs still remain at a tottering stage, since there is no accumulated knowledge in many aspects, including systemic know-how and education. Therefore, this study attempted to introduce the definition of the entrepreneur (founder’s) spirit and furthermore identify the characteristics required for entrepreneurs as the subject of management. It thus tried to examine how those characteristics have an influence on entrepreneurs as their successful conditions, and presented foreign cases after analyzing the entrepreneur spirit through case studies. The entrepreneur spirit and the venture management emerge as a new field in business administration and scholars have reported various theories. Further research activities and efforts for active exchanges are also needed thereof.

Keywords: venture, entrepreneur, entrepreneur (founder’s) spirit, characteristics of entrepreneur spirit

Procedia PDF Downloads 201
765 An Engineered Epidemic: Big Pharma's Role in the Opioid Crisis

Authors: Donna L. Roberts

Abstract:

2019 marked 23 years since Purdue Pharma launched its flagship drug, OxyContin, that unleashed an unprecedented epidemic touching both celebrities and common citizens, metropolitan, suburbia and rural areas and all levels of socioeconomic status. From rural Appalachia to East LA individuals, families and communities have been devastated by a trajectory of addiction that often began with the legitimate prescription of a pain killer for anything from a tooth extraction to a sports injury to recovery from surgery or chronic arthritis. Far from being a serendipitous progression of events, the proliferation of this new breed of 'miracle drug' was instead a carefully crafted marketing program aimed at both the medical community and common citizens. This research represents and in-depth investigation of the evolution of the marketing, distribution and promotion of prescription opioids by pharmaceutical companies and its relationship to the propagation of the opioid crisis. Specifically, key components of Purdue Pharma’s aggressive marketing campaign, including its bonus system and sales incentives, were analyzed in the context of the sociopolitical environment that essential created the proverbial 'perfect storm' for the changing manner in which pain is treated in the U.S. The analyses of these series of events clearly indicate their role in first, the increase in prescription of opioids for non-terminal pain relief and subsequently, the incidence of related addiction, overdose, and death. Through this examination of the conditions that facilitated and maintained this drug crisis, perhaps we can begin to chart a course toward its resolution.

Keywords: addiction, opioid, opioid crisis, Purdue Pharma

Procedia PDF Downloads 100
764 Comics Scanlation and Publishing Houses Translation

Authors: Sharifa Alshahrani

Abstract:

Comics is a multimodal text wherein meaning is created by taking in all modes of expression at once. It uses two different semiotic modes, the verbal and the visual modes, together to make meaning and these different semiotic modes can be socially and culturally shaped to give meaning. Therefore, comics translation cannot treat comics as a monomodal text by translating only the verbal mode inside or outside the speech balloons as the cultural differences are encoded in the visual mode as well. Due to the development of the internet and editing software, comics translation is not anymore confined to the publishing houses and official translation as scanlation, or the fan translation took the initiative in translating comics for being emotionally attracted to the culture and genre. Scanlation is carried out by volunteering fans who translate out of passion. However, quality is one of the debatable issues relating to scanlation and fan translation. This study will investigate how the dynamic multimodal relationship in comics is exploited and interpreted in the translation by exploring the translation strategies and procedures adopted by the publishing houses and scanlation in interpreting comics into Arabic using three analytical frameworks; cultural references model, multimodal relation model and translation strategies and procedures models.

Keywords: comics, multimodality, translation, scanlation

Procedia PDF Downloads 191
763 Organizational Change in the FBI after 9/11: An Institutional Theoretical Analysis

Authors: Ben D. Atkins

Abstract:

This study will examine the impact of September 11, 2001, terrorist attacks on the organizational development of American federal law enforcement through focusing on the Federal Bureau of Investigation. Content analysis of discourse in a federal law enforcement practitioner publication along with official FBI statements will be used to gain a better understanding of FBI organizational changes that have taken place since the events of September 11, 2001. Analysis of content trends in the FBI Law Enforcement Bulletin and public discourse of FBI officials from 1999 to 2005 indicate that, in addition to structural changes, the bureau has also undergone a variety of cultural changes. The results offer some support for the institutional theoretical perspective, suggesting that post-9/11 organizational changes such as new mission priorities and the establishment of new branches were partially initiated due to a variety external pressures, which lends support for coercive isomorphism. Furthermore, structural changes are discussed in relation to the attainment and maintenance of organizational legitimacy.

Keywords: institutional theory, organizational theory, law enforcement, public administration

Procedia PDF Downloads 217