Search results for: existential threat
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1097

Search results for: existential threat

587 Stochastic Edge Based Anomaly Detection for Supervisory Control and Data Acquisitions Systems: Considering the Zambian Power Grid

Authors: Lukumba Phiri, Simon Tembo, Kumbuso Joshua Nyoni

Abstract:

In Zambia recent initiatives by various power operators like ZESCO, CEC, and consumers like the mines to upgrade power systems into smart grids target an even tighter integration with information technologies to enable the integration of renewable energy sources, local and bulk generation, and demand response. Thus, for the reliable operation of smart grids, its information infrastructure must be secure and reliable in the face of both failures and cyberattacks. Due to the nature of the systems, ICS/SCADA cybersecurity and governance face additional challenges compared to the corporate networks, and critical systems may be left exposed. There exist control frameworks internationally such as the NIST framework, however, there are generic and do not meet the domain-specific needs of the SCADA systems. Zambia is also lagging in cybersecurity awareness and adoption, therefore there is a concern about securing ICS controlling key infrastructure critical to the Zambian economy as there are few known facts about the true posture. In this paper, we introduce a stochastic Edged-based Anomaly Detection for SCADA systems (SEADS) framework for threat modeling and risk assessment. SEADS enables the calculation of steady-steady probabilities that are further applied to establish metrics like system availability, maintainability, and reliability.

Keywords: anomaly, availability, detection, edge, maintainability, reliability, stochastic

Procedia PDF Downloads 110
586 Numerical Simulation on Bacteria-Carrying Particles Transport and Deposition in an Open Surgical Wound

Authors: Xiuguo Zhao, He Li, Alireza Yazdani, Xiaoning Zheng, Xinxi Xu

Abstract:

Wound infected poses a serious threat to the surgery on the patient during the process of surgery. Understanding the bacteria-carrying particles (BCPs) transportation and deposition in the open surgical wound model play essential role in protecting wound against being infected. Therefore BCPs transportation and deposition in the surgical wound model were investigated using force-coupling method (FCM) based computational fluid dynamics. The BCPs deposition in the wound was strongly associated with BCPs diameter and concentration. The results showed that the rise on the BCPs deposition was increasing not only with the increase of BCPs diameters but also with the increase of the BCPs concentration. BCPs deposition morphology was impacted by the combination of size distribution, airflow patterns and model geometry. The deposition morphology exhibited the characteristic with BCPs deposition on the sidewall in wound model and no BCPs deposition on the bottom of the wound model mainly because the airflow movement in one direction from up to down and then side created by laminar system constructing airflow patterns and then made BCPs hard deposit in the bottom of the wound model due to wound geometry limit. It was also observed that inertial impact becomes a main mechanism of the BCPs deposition. This work may contribute to next study in BCPs deposition limit, as well as wound infected estimation in surgical-site infections.

Keywords: BCPs deposition, computational fluid dynamics, force-coupling method (FCM), numerical simulation, open surgical wound model

Procedia PDF Downloads 289
585 Geochemistry Identification of Volcanic Rocks Product of Krakatau Volcano Eruption for Katastropis Mitigation Planning

Authors: Agil Gemilang Ramadhan, Novian Triandanu

Abstract:

Since 1929, the first appearance in sea level, Anak Krakatau volcano growth relatively quickly. During the 80 years up to 2010 has reached the height of 320 meter above sea level. The possibility of catastrophic explosive eruption could happen again if the chemical composition of rocks from the eruption changed from alkaline magma into acid magma. Until now Anak Krakatau volcanic activity is still quite active as evidenced by the frequency of eruptions that produced ash sized pyroclastic deposits - bomb. Purpose of this study was to identify changes in the percentage of rock geochemistry any results eruption of Anak Krakatau volcano to see consistency change the percentage content of silica in the magma that affect the type of volcanic eruptions. Results from this study will be produced in the form of a diagram the data changes the chemical composition of rocks of Anak Krakatau volcano. Changes in the composition of any silica eruption are illustrated in a graph. If the increase in the percentage of silica is happening consistently and it is assumed to increase in the time scale of a few percent, then to achieve silica content of 68 % (acid composition) that will produce an explosive eruption will know the approximate time. All aspects of the factors driving the increased threat of danger to the public should be taken into account. Catastrophic eruption katatropis mitigation can be planned early so that when these disasters happen later, casualties can be minimized.

Keywords: Krakatau volcano, rock geochemistry, catastrophic eruption, mitigation

Procedia PDF Downloads 281
584 A Study on the Failure Modes of Steel Moment Frame in Post-Earthquake Fire Using Coupled Mechanical-Thermal Analysis

Authors: Ehsan Asgari, Meisam Afazeli, Nezhla Attarchian

Abstract:

Post-earthquake fire is considered as a major threat in seismic areas. After an earthquake, fire is possible in structures. In this research, the effect of post-earthquake fire on steel moment frames with and without fireproofing coating is investigated. For this purpose, finite element method is employed. For the verification of finite element results, the results of an experimental study carried out by previous researchers are used, and the predicted FE results are compared with the test results, and good agreement is observed. After ensuring the accuracy of the predictions of finite element models, the effect of post-earthquake fire on the frames is investigated taking into account the parameters including the presence or absence of fire protection, frame design assumptions, earthquake type and different fire scenario. Ordinary fire and post-earthquake fire effect on the frames is also studied. The plastic hinges induced by earthquake in the structure are determined in the beam to the column connection and in panel zone. These areas should be accurately considered when providing fireproofing coatings. The results of the study show that the occurrence of fire beside corner columns is the most damaging scenario that results in progressive collapse of structure. It was also concluded that the behavior of structure in fire after a strong ground motion is significantly different from that in a normal fire.

Keywords: post earthquake fire, moment frame, finite element simulation, coupled temperature-displacement analysis, fire scenario

Procedia PDF Downloads 154
583 Impact of Disposed Drinking Water Sachets in Damaturu Town, Yobe State, Nigeria

Authors: Meeta Ratawa Tiwary

Abstract:

Damaturu is the capital of Yobe State in northeastern Nigeria where civic amenities and facilities are not adequate even after 24 years of its existence. The volatile security and political situations are most significant causes for the same. The basic facility for the citizens in terms of drinking water and electricity are not available. For the drinking water, they have to rely on personal bore holes or the filtered borehole waters available in packaged sachets in the market. The present study is concerned with the environmental impact of indiscriminate disposal of drinking synthetic polythene water sachets in Damaturu. The sachet water is popularly called as ‘pure water’, but its purity is questionable. Increased production and consumption of sachet water has led to indiscriminate dumping and disposal of empty sachets leading to a serious environmental threat. The evidence of this is seen in the amount of disposed sachets littering the streets and also the drainages blocked by ‘blocks’ of water sachet waste. Sachet water gained much popularity in Nigeria because the product is convenient for use, affordable and economically viable. The present study aims to find out the solution to this environmental problem. The field-based study has found some significant factors that cause environmental and socio-economic effect due to this. Some recommendations have been made based on research findings regarding sustainable waste management, recycling and re-use of the non-biodegradable products in society.

Keywords: civic amenities, non-biodegradable, pure water, sustainable environment, waste disposal

Procedia PDF Downloads 422
582 Mediated and Moderated Effects of Insecure Attachment Style and Depressions

Authors: Li-Ting Chen, Chih-Tao Cheng, I-Ping Huang, Jen-Ho Chang, Nien-Tzu Chang, Fei-Hsiu Hsiao

Abstract:

Background: Insecurity adult attachment style may be triggered by cancer threat, which in turn influences depression symptoms. Dispositional mindfulness may have benefits of insecure attachment on depression for colorectal patient transfer to survivor. Objective: This study examined the mediating and moderating effects of quality of life (QOL) and dispositional mindfulness on the relationship between insecure attachment style and depression symptoms. Methods: A cross-sectional study design was used. Data were collected using the QOL functional and symptoms (EORTC-C30 and EORTC CR29), dispositional mindfulness (FFMQ), Short form of Experience in Close Relationships Revised Questionnaire (SF-ECRRQ), and depressive symptoms (BDI-II scale). Results: Of the 90 CRC survivors who participated, the indirect effect of both ECR anxiety (β=0.23, CI=0.05-0.44) and ECR avoidance (β=0.12, CI=0.02-0.24) on depression were significantly mediated through EORTC-C29 colorectal symptoms. Three components of dispositional mindfulness (i.e., acting of awareness, non-judging, non-reactivity) as the moderator in the relationship between ECR anxiety and depressive symptoms. Acting of awareness was a moderator in the relationship between ECR avoidance and depressive symptoms. Conclusions: There are two pathways from insecure attachment to depression: through the mediator of colorectal symptoms and the moderator of dispositional mindfulness. Cancer symptom management and mindfulness practices could improve the impact of insecure attachment on depression among CRC patients in a post-treatment transition period.

Keywords: acting of awareness, attachment style, colorectal cancer, disposisitonal mindfulness, depression

Procedia PDF Downloads 65
581 The Abundance and Distribution of Locally Important Species Along Different Altitude: The Case of Mountain Damota, Wolaita South Ethiopia

Authors: Tamirat Solomon, Tadesse Faltamo, Belete Limani

Abstract:

This study was conducted on the mountain Damota of Wolaita to assess the abundance and spatial distribution of two locally important indigenous medicinal plants on the mountain landscape. A total of 130 plots measuring 20x20m were established along eight systematically laid transect lines. In each plot, the abundance and distribution of Hagenia abyssinica (tree) and Pentas schiperiana Vatke (shrub) were evaluated. The abundance and distribution of H. abyssinica were evaluated by measuring height and DBH for mature trees and counting seedlings and saplings, whereas the P. schiperiana Vatke was assessed for its abundance and distribution by counting in each plot. In the entire study plots, a total of 485 H. abyssinica and 760 P. schiperiana vatake were recorded. It was observed that the distribution of the species increased while the altitude increased and the highest abundance of the species was recorded at an altitude range between 2332 and 2661m.a.s.l. However, at the altitudes below 2320 m.a.s.l., the species distributions and abundance was decreased, indicating either the ecological preference of the species or the extraction of the local community surrounding the mountain influenced the species. On average, only 28 seedlings/ha of H. abyssinica and 146/ha of P. schiperiana vatke were recorded in the study areas showing the tendency of decline in the abundance and distribution of both species. Finally, we recommend management intervention for the socially important species which are under threat on the mountain landscape.

Keywords: indigenous medicinal plants, H.abyssinic, P. schiperiana, distribution, abundance, socio-economic importance

Procedia PDF Downloads 122
580 Controlling the Oxygen Vacancies in the Structure of Anode Materials for Improved Electrochemical Performance in Lithium-Ion Batteries

Authors: Moustafa M. S. Sanad

Abstract:

The worsening of energy supply crisis and the exacerbation of climate change by environmental pollution problems have become the greatest threat to human life. One of the ways to confront these problems is to rely on renewable energy and its storage systems. Nowadays, huge attention has been directed to the development of lithium-ion batteries (LIBs) as efficient tools for storing the clean energy produced by green sources like solar and wind energies. Accordingly, the demand for powerful electrode materials with excellent electrochemical characteristics has been progressively increased to meet fast and continuous growth in the market of energy storage systems. Therefore, the electronic and electrical properties of conversion anode materials for rechargeable lithium-ion batteries (LIBs) can be enhanced by introducing lattice defects and oxygen vacancies in the crystal structure. In this regard, the intended presentation will demonstrate new insights and effective ways for enhancing the electrical conductivity and improving the electrochemical performance of different anode materials such as MgFe₂O₄, CdFe₂O₄, Fe₃O₄, LiNbO₃ and Nb₂O₅. The changes in the physicochemical and morphological properties have been deeply investigated via structural and spectroscopic analyses (e.g., XRD, FESEM, HRTEM, and XPS). Moreover, the enhancement in the electrochemical properties of these anode materials will be discussed through Galvanostatic Cycling (GC), Cyclic Voltammetry (CV) and Electrochemical Impedance Spectroscopy (EIS) techniques.

Keywords: structure modification, cationic substitution, non-stoichiometric synthesis, plasma treatment, lithium-ion batteries

Procedia PDF Downloads 60
579 21st Century Gunboat Diplomacy and Strategic Sea Areas

Authors: Mustafa Avsever

Abstract:

Throughout history, states have attached great importance to seas in terms of economic and security. Advanced civilizations have always founded in coastal regions. Over time, human being has tended to trade and naturally always aimed get more and more. Seas by covering 71% of the earth, provide the greatest economic opportunities for access to raw material resources and the world market. As a result, seas have become the most important areas of conflict over the course of time. Coastal states, use seas as a tool for defense zone, trade, marine transportation and power transfer, they have acquired colonies overseas and increased their capital, raw materials and labor. Societies, have increased their economic prosperity, though their navies in order to retain their welfare and achieve their foreign policy objectives. Sometimes they have imposed their demands through the use or threat of limited naval force in accordance with their interests that is gunboat diplomacy. Today we can see samples of gunboat diplomacy used in the Eastern Mediterranean, during Ukraine crisis, in dispute between North Korea and South Korea and the ongoing power struggle in Asia-Pacific. Gunboat diplomacy has been and continues to be applied consistently in solving problems by the stronger side of the problem. The purpose of this article is to examine using navy under the gunboat diplomacy as an active instrument of foreign policy and security policy and reveal the strategic sea areas in which gunboat diplomacy is used effectively in the matrix of international politics in the 21st century.

Keywords: gunboat diplomacy, maritime strategy, sea power, strategic sea lands

Procedia PDF Downloads 432
578 Predicting Response to Cognitive Behavioral Therapy for Psychosis Using Machine Learning and Functional Magnetic Resonance Imaging

Authors: Eva Tolmeijer, Emmanuelle Peters, Veena Kumari, Liam Mason

Abstract:

Cognitive behavioral therapy for psychosis (CBTp) is effective in many but not all patients, making it important to better understand the factors that determine treatment outcomes. To date, no studies have examined whether neuroimaging can make clinically useful predictions about who will respond to CBTp. To this end, we used machine learning methods that make predictions about symptom improvement at the individual patient level. Prior to receiving CBTp, 22 patients with a diagnosis of schizophrenia completed a social-affective processing task during functional MRI. Multivariate pattern analysis assessed whether treatment response could be predicted by brain activation responses to facial affect that was either socially threatening or prosocial. The resulting models did significantly predict symptom improvement, with distinct multivariate signatures predicting psychotic (r=0.54, p=0.01) and affective (r=0.32, p=0.05) symptoms. Psychotic symptom improvement was accurately predicted from relatively focal threat-related activation across hippocampal, occipital, and temporal regions; affective symptom improvement was predicted by a more dispersed profile of responses to prosocial affect. These findings enrich our understanding of the neurobiological underpinning of treatment response. This study provides a foundation that will hopefully lead to greater precision and tailoring of the interventions offered to patients.

Keywords: cognitive behavioral therapy, machine learning, psychosis, schizophrenia

Procedia PDF Downloads 274
577 Efficient Credit Card Fraud Detection Based on Multiple ML Algorithms

Authors: Neha Ahirwar

Abstract:

In the contemporary digital era, the rise of credit card fraud poses a significant threat to both financial institutions and consumers. As fraudulent activities become more sophisticated, there is an escalating demand for robust and effective fraud detection mechanisms. Advanced machine learning algorithms have become crucial tools in addressing this challenge. This paper conducts a thorough examination of the design and evaluation of a credit card fraud detection system, utilizing four prominent machine learning algorithms: random forest, logistic regression, decision tree, and XGBoost. The surge in digital transactions has opened avenues for fraudsters to exploit vulnerabilities within payment systems. Consequently, there is an urgent need for proactive and adaptable fraud detection systems. This study addresses this imperative by exploring the efficacy of machine learning algorithms in identifying fraudulent credit card transactions. The selection of random forest, logistic regression, decision tree, and XGBoost for scrutiny in this study is based on their documented effectiveness in diverse domains, particularly in credit card fraud detection. These algorithms are renowned for their capability to model intricate patterns and provide accurate predictions. Each algorithm is implemented and evaluated for its performance in a controlled environment, utilizing a diverse dataset comprising both genuine and fraudulent credit card transactions.

Keywords: efficient credit card fraud detection, random forest, logistic regression, XGBoost, decision tree

Procedia PDF Downloads 67
576 Reverse Supply Chain Analysis of Lithium-Ion Batteries Considering Economic and Environmental Aspects

Authors: Aravind G., Arshinder Kaur, Pushpavanam S.

Abstract:

There is a strong emphasis on shifting to electric vehicles (EVs) throughout the globe for reducing the impact on global warming following the Paris climate accord. Lithium-ion batteries (LIBs) are predominantly used in EVs, and these can be a significant threat to the environment if not disposed of safely. Lithium is also a valuable resource not widely available. There are several research groups working on developing an efficient recycling process for LIBs. Two routes - pyrometallurgical and hydrometallurgical processes have been proposed for recycling LIBs. In this paper, we focus on life cycle assessment (LCA) as a tool to quantify the environmental impact of these recycling processes. We have defined the boundary of the LCA to include only the recycling phase of the end-of-life (EoL) of the battery life cycle. The analysis is done assuming ideal conditions for the hydrometallurgical and a combined hydrometallurgical and pyrometallurgical process in the inventory analysis. CML-IA method is used for quantifying the impact assessment across eleven indicators. Our results show that cathode, anode, and foil contribute significantly to the impact. The environmental impacts of both hydrometallurgical and combined recycling processes are similar across all the indicators. Further, the results of LCA are used in developing a multi-objective optimization model for the design of lithium-ion battery recycling network. Greenhouse gas emissions and cost are the two parameters minimized for the optimization study.

Keywords: life cycle assessment, lithium-ion battery recycling, multi-objective optimization, network design, reverse supply chain

Procedia PDF Downloads 157
575 Investigating Knowledge Management in Financial Organisation: Proposing a New Model for Implementing Knowledge Management

Authors: Ziba R. Tehrani, Sanaz Moayer

Abstract:

In the age of the knowledge-based economy, knowledge management has become a key factor in sustainable competitive advantage. Knowledge management is discovering, acquiring, developing, sharing, maintaining, evaluating, and using right knowledge in right time by right person in organization; which is accomplished by creating a right link between human resources, information technology, and appropriate structure, to achieve organisational goals. Studying knowledge management financial institutes shows the knowledge management in banking system is not different from other industries but because of complexity of bank’s environment, the implementation is more difficult. The bank managers found out that implementation of knowledge management will bring many advantages to financial institutes, one of the most important of which is reduction of threat to lose subsequent information of personnel job quit. Also Special attention to internal conditions and environment of the financial institutes and avoidance from copy-making in designing the knowledge management is a critical issue. In this paper, it is tried first to define knowledge management concept and introduce existing models of knowledge management; then some of the most important models which have more similarities with other models will be reviewed. In second step according to bank requirements with focus on knowledge management approach, most major objectives of knowledge management are identified. For gathering data in this stage face to face interview is used. Thirdly these specified objectives are analysed with the response of distribution of questionnaire which is gained through managers and expert staffs of ‘Karafarin Bank’. Finally based on analysed data, some features of exiting models are selected and a new conceptual model will be proposed.

Keywords: knowledge management, financial institute, knowledge management model, organisational knowledge

Procedia PDF Downloads 360
574 Identification of Workplace Hazards of Underground Coal Mines

Authors: Madiha Ijaz, Muhammad Akram, Sima Mir

Abstract:

Underground mining of coal is carried out manually in Pakistan. Exposure to ergonomic hazards (musculoskeletal disorders) are very common among the coal cutters of these mines. Cutting coal in narrow spaces poses a great threat to both upper and lower limbs of these workers. To observe the prevalence of such hazards, a thorough study was conducted on 600 workers from 30 mines (20 workers from 1 mine), located in two districts of province Punjab, Pakistan. Rapid Upper Limb Assessment sheet and Rapid Entire Body Assessment sheet were used for the study along with a standard Nordic Musculoskeleton disorder questionnaire. SPSS, 25, software was used for data analysis on upper and lower limb disorders, and regression analysis models were run for upper and lower back pain. According to the results obtained, it was found that work stages (drilling & blasting, coal cutting, timbering & supporting, etc.), wok experience and number of repetitions performed/minute were significant (with p-value 0.00,0.004 and 0.009, respectively) for discomfort in upper and lower limb. Age got p vale 0.00 for upper limb and 0.012 for lower limb disorder. The task of coal cutting was strongly associated with the pain in upper back (with odd ratios13.21, 95% confidence interval (CI)14.0-21.64)) and lower back pain (3.7, 95% confidence interval 1.3-4.2). scored on RULA and REBA sheets, every work-stage was ranked at 7-highest level of risk involved. Workers were young (mean value of age= 28.7 years) with mean BMI 28.1 kg/m2

Keywords: workplace hazards, ergonomic disorders, limb disorders, MSDs.

Procedia PDF Downloads 84
573 Hydrodeoxygenation of Furfural over RU Sub-Nano Particles Supported on Al₂O₃-SIO₂ Mixed Oxides

Authors: Chaima Zoulikha Tabet Zatla, Nihel Dib, Sumeya Bedrane, Juan Carlos Hernandez Garrido, Redouane Bachir, Miguel Angel Cauqui, Jose Juan Calvino Gamez

Abstract:

These last year's our planet has witnessed global warming, which is a serious threat to our lives; it has many causes, such as the CO₂ excess in the atmosphere that results from our activity, for the purpose of living in a neater and better environment, working and improving an eco-responsible energy system is a must. Valorization of biomass to produce biofuels is among the most compelling routes to decrease air pollution without considerable modification in current vehicle technology. Effective transformation of lignocellulosic biomass-derived compounds into liquid fuels and value-added chemicals is an economically viable solution. Presently, very competitive technics for the conversion of lignocellulosic biomass into platform chemicals, such as furfural and Hydroxymethylfurfural (HMF), are used. Furfural (C₅H₄O₂) is a major hemi cellulosic biomass-derived platform molecule. In our work, we focus on the valorization of lignocellulosic biomass derivative furfural that is transformed into biofuel through a hydrodeoxygenation reaction in general and involving a catalytic process. In order to get to this point, we are synthesizing and characterizing a series of catalysts with different amounts of Ru (0.5%, 1% and 2%) supported on alumina-silica mixed oxides with various molar ratios (Si/Al = 2.5; 5; 7; 10; 15). These catalysts will be characterized by numerous technics such as N₂ adsorption/desorption, Pyridine adsorption (acidity measure), FTIR, X-rays diffraction, AAS, TEM and SEM.

Keywords: furfural, ruthenium, silica-alumina, biomass, biofuel

Procedia PDF Downloads 84
572 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours

Authors: Elham Rajabian

Abstract:

The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.

Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture

Procedia PDF Downloads 97
571 A Multi-Science Study of Modern Synergetic War and Its Information Security Component

Authors: Alexander G. Yushchenko

Abstract:

From a multi-science point of view, we analyze threats to security resulting from globalization of international information space and information and communication aggression of Russia. A definition of Ruschism is formulated as an ideology supporting aggressive actions of modern Russia against the Euro-Atlantic community. Stages of the hybrid war Russia is leading against Ukraine are described, including the elements of subversive activity of the special services, the activation of the military phase and the gradual shift of the focus of confrontation to the realm of information and communication technologies. We reveal an emergence of a threat for democratic states resulting from the destabilizing impact of a target state’s mass media and social networks being exploited by Russian secret services under freedom-of-speech disguise. Thus, we underline the vulnerability of cyber- and information security of the network society in regard of hybrid war. We propose to define the latter a synergetic war. Our analysis is supported with a long-term qualitative monitoring of representation of top state officials on popular TV channels and Facebook. From the memetics point of view, we have detected a destructive psycho-information technology used by the Kremlin, a kind of information catastrophe, the essence of which is explained in detail. In the conclusion, a comprehensive plan for information protection of the public consciousness and mentality of Euro-Atlantic citizens from the aggression of the enemy is proposed.

Keywords: cyber and information security, hybrid war, psycho-information technology, synergetic war, Ruschism

Procedia PDF Downloads 134
570 Coral Lifeform Structure in Selected Marine Protected Areas in Southern Cebu, Philippines

Authors: Gloria G. Delan, Alfonso S. Piquero, Rachel Luz V. Rica, Christine M. Corrales

Abstract:

The selected marine protected areas (MPAs) of southern Cebu, Philippines were assessed after these have been established between the years 2000 to 2007. These include Casay of Argao, Cawayan of Dalaguete, Guiwang-Daang Lungsod of Alcoy, North Granada of Boljoon and Sta. Cruz of Ronda. These MPAs were assessed to gather baseline information on its coral life-form structure. Point-intercept transect (PIT) method was used in the observation. Benthic life form and reef substrate at each 0.25 m point interval were identified and recorded along 50 meters transect line both inside and outside of these MPAs. It has been observed that massive, branching and digitate form of corals dominated among the five sanctuaries. Percentage of Live Hard Corals was much higher inside than outside in all sanctuaries. Common to all sanctuaries were noticeable presence of dead corals with algae and coral rubbles indicating an over-exploited habitat. Casay, Cawayan and Daan-Lungsod MPAs had some Crown of Thorn Starfish (COTS) which may pose threat to its coral community. It has been recommended that there should be strict law enforcement and a long term monitoring to continuously conserve and protect coral reef which is an important habitat for fishes for its sustainability as food for human.

Keywords: coral rubbles, coral reef, live hard coral, point-intercept transect

Procedia PDF Downloads 418
569 Investigating the Socio-ecological Impacts of Sea Level Rise on Coastal Rural Communities in Ghana

Authors: Benjamin Ankomah-Asare, Richard Adade

Abstract:

Sea level rise (SLR) poses a significant threat to coastal communities globally. Ghana has over the years implemented protective measures such as the construction of groynes and revetment to serve as barriers to sea waves in major cities and towns to prevent sea erosion and flooding. For vulnerable rural coastal communities, the planned retreat is often proposed; however, relocation costs are often underestimated as losses of future social and cultural value are not always adequately taken into account. Through a mixed-methods approach combining qualitative interviews, surveys, and spatial analysis, the study examined the experiences of coastal rural communities in Ghana and assess the effectiveness of relocation strategies in addressing the socio-economic and environmental challenges posed by sea level rise. The study revealed the devastating consequences of sea level rise on these communities, including increased flooding, erosion, and saltwater intrusion into freshwater sources. Moreover, it highlights the adaptive capacities within these communities and how factors such as infrastructure, economic activities, cultural heritage, and governance structures shape their resilience in the face of environmental change. While relocation can be an effective strategy in reducing the risks associated with sea level rise, the study recommends that proper implementation of this adaptation strategy can be achieved when coupled with community-led planning, participatory decision-making, and targeted support for vulnerable groups.

Keywords: sea level rise, relocation, socio-ecological impacts, rural communities

Procedia PDF Downloads 50
568 Removal of Gaseous Pollutant from the Flue Gas in a Submerged Self-Priming Venturi Scrubber

Authors: Manisha Bal, B. C. Meikap

Abstract:

Hydrogen chloride is the most common acid gas emitted by the industries. HCl gas is listed as Title III hazardous air pollutant. It causes severe threat to the human health as well as environment. So, removal of HCl from flue gases is very imperative. In the present study, submerged self-priming venturi scrubber is chosen to remove the HCl gas with water as a scrubbing liquid. Venturi scrubber is the most popular device for the removal of gaseous pollutants. Main mechanism behind the venturi scrubber is the polluted gas stream enters at converging section which accelerated to maximum velocity at throat section. A very interesting thing in case of submerged condition, venturi scrubber is submerged inside the liquid tank and liquid is entered at throat section because of suction created due to large pressure drop generated at the throat section. Maximized throat gas velocity atomizes the entered liquid into number of tiny droplets. Gaseous pollutant HCl is absorbed from gas to liquid droplets inside the venturi scrubber due to interaction between the gas and water. Experiments were conducted at different throat gas velocity, water level and inlet concentration of HCl to enhance the HCl removal efficiency. The effect of throat gas velocity, inlet concentration of HCl, and water level on removal efficiency of venturi scrubber has been evaluated. Present system yielded very high removal efficiency for the scrubbing of HCl gas which is more than 90%. It is also concluded that the removal efficiency of HCl increases with increasing throat gas velocity, inlet HCl concentration, and water level height.

Keywords: air pollution, HCl scrubbing, mass transfer, self-priming venturi scrubber

Procedia PDF Downloads 141
567 Behavioral Changes and Gill Histopathological Alterations of Red Hybrid Tilapia (Oreochromis sp.) Exposed to Glyphosate Herbicide

Authors: Abubakar Muhammad Umar, Nur Adeela Yasid, Hassan Mohd Daud, Mohd Yunus Abd Shukor

Abstract:

Glyphosate [N-(phosphonomethyl) glycine] is among the most broadly and generally recognised broad-spectrum herbicides used in agriculture due to its low cost and effectiveness in weed management. The pollution of glyphosate in the aquatic environment can be via water run-off from agricultural lands, or by spray drift, aerial spraying or due to industrial discharge, which may be seen as a threat to aquatic biota. Fish is one of the best organisms to study the toxicological aspects of glyphosate. A 49 days experiment was conducted under laboratory conditions to ascertain the effects of technical grade glyphosate on behaviour and histopathological conditions in the gills of red hybrid tilapia using a light inverted microscope. Air gasping, erratic swimming, fin movement, mucus secretion, hemorrhages, and loss of scales were observed as behavioural changes in the exposed fish. There was no histopathological complication observed in the gill of the control fish, but various levels of alterations were seen in the gills of the fish exposed to glyphosate herbicide. These include lifting of primary lamella, congestion of secondary lamella, as well as hyperplasia in both primary and secondary gill lamella, and hypertrophy of secondary gill lamella. Based on the findings of this study, glyphosate herbicide exerts behavioural and histopathological changes in the gill of red hybrid tilapia, and therefore, the fish is considered a good bioindicator in aquatic environment monitoring. Excessive usage of glyphosate herbicide near aquatic habitats should be discouraged.

Keywords: behavioural, histopathological, Oreochromis niloticus, glyphosate

Procedia PDF Downloads 48
566 Enhanced Model for Risk-Based Assessment of Employee Security with Bring Your Own Device Using Cyber Hygiene

Authors: Saidu I. R., Shittu S. S.

Abstract:

As the trend of personal devices accessing corporate data continues to rise through Bring Your Own Device (BYOD) practices, organizations recognize the potential cost reduction and productivity gains. However, the associated security risks pose a significant threat to these benefits. Often, organizations adopt BYOD environments without fully considering the vulnerabilities introduced by human factors in this context. This study presents an enhanced assessment model that evaluates the security posture of employees in BYOD environments using cyber hygiene principles. The framework assesses users' adherence to best practices and guidelines for maintaining a secure computing environment, employing scales and the Euclidean distance formula. By utilizing this algorithm, the study measures the distance between users' security practices and the organization's optimal security policies. To facilitate user evaluation, a simple and intuitive interface for automated assessment is developed. To validate the effectiveness of the proposed framework, design science research methods are employed, and empirical assessments are conducted using five artifacts to analyze user suitability in BYOD environments. By addressing the human factor vulnerabilities through the assessment of cyber hygiene practices, this study aims to enhance the overall security of BYOD environments and enable organizations to leverage the advantages of this evolving trend while mitigating potential risks.

Keywords: security, BYOD, vulnerability, risk, cyber hygiene

Procedia PDF Downloads 76
565 Political Corruption and Workplace Misconduct

Authors: Masako Darrough, Mahmud Hossain, Santanu Mitra

Abstract:

The prevalent and increasing workplace misconduct in the United States presents a significant threat to social welfare. Despite efforts by enforcement agencies, U.S. workers remain vulnerable to employer exploitation, as evidenced by rising workplace injuries and discrimination lawsuits. While existing literature has identified several factors associated with unethical labor practices, the influence of political corruption remains largely unexplored. This paper aims to fill this gap by investigating the relationship between political corruption and workplace misconduct in the U.S. context. Using the data from the U.S. Bureau of Labor Statistics, the Equal Employment Opportunity Commission, and corruption convictions reported by the Department of Justice, we find a positive association between political corruption and workplace misconduct among U.S.-listed firms that are headquartered in different states from 2004 to 2022. Both unionization and stricter labor laws attenuate the positive association between corruption and unethical labor practices. Our analyses also address potential endogeneity concerns via difference-in-differences, instrumental variables, and propensity-score-matched analyses, reaffirming the robustness of our findings. This research contributes to the literature by shedding light on how corrupt political climates influence organizational operational behavior and unethical practices. It also underscores the importance of stakeholder trust and the role of regulatory frameworks and offers practical insights to policymakers by suggesting a judicious allocation of enforcement resources to more corrupt states.

Keywords: workplace misconduct, political corruption, unionization, labor law strictness

Procedia PDF Downloads 23
564 A Deep Learning Approach to Online Social Network Account Compromisation

Authors: Edward K. Boahen, Brunel E. Bouya-Moko, Changda Wang

Abstract:

The major threat to online social network (OSN) users is account compromisation. Spammers now spread malicious messages by exploiting the trust relationship established between account owners and their friends. The challenge in detecting a compromised account by service providers is validating the trusted relationship established between the account owners, their friends, and the spammers. Another challenge is the increase in required human interaction with the feature selection. Research available on supervised learning (machine learning) has limitations with the feature selection and accounts that cannot be profiled, like application programming interface (API). Therefore, this paper discusses the various behaviours of the OSN users and the current approaches in detecting a compromised OSN account, emphasizing its limitations and challenges. We propose a deep learning approach that addresses and resolve the constraints faced by the previous schemes. We detailed our proposed optimized nonsymmetric deep auto-encoder (OPT_NDAE) for unsupervised feature learning, which reduces the required human interaction levels in the selection and extraction of features. We evaluated our proposed classifier using the NSL-KDD and KDDCUP'99 datasets in a graphical user interface enabled Weka application. The results obtained indicate that our proposed approach outperformed most of the traditional schemes in OSN compromised account detection with an accuracy rate of 99.86%.

Keywords: computer security, network security, online social network, account compromisation

Procedia PDF Downloads 119
563 Evaluation of Nematicidal Action of Some Botanicals on Plant-Parasitic Nematode

Authors: Lakshmi, Yakshita Awasthi, Deepika, Lovleen Jha, Archna Kumar

Abstract:

From the back of centuries, plant-parasitic nematodes (PPN) have been recognized as a major threat to agriculturalists globally. It causes 21.3% global food loss annually. The utilization of harmful chemical pesticides to minimize the nematode population may cause acute and delayed health hazards and harmful impacts on human health. In recent years, a variety of plants have been evaluated for their nematicidal properties and efficacy in the management of plant-parasitic nematodes. Several Phyto-nematicides are available, but most of them are incapable of sustainable management of PPN, especially Meloidogyne spp. Thus, there is a great need for a new eco-friendly, highly efficient, sustainable control measure for this nematode species. Keeping all these facts and after reviewing the literature, aqueous extract of Cymbopogon citratus, Tagetes erecta, and Azadirachta indica were prepared by adding distilled water (1 g sample mixed with 10ml of water). In vitro studies were conducted to evaluate the efficacious nature of targeted botanicals against PPN Meloidogyne spp. The mortality status of PPN was recorded by counting the live and dead individuals after applying 100μl of selected extract. The impact was observed at different time durations, i.e., 24h and 48h. The result showed that the highest 100% mortality was at 48h in all three extracts. Thus, these extracts, with the addition of a suitable shelf-life enhancer, may be exploited in different nematode control programs as an economical, sustainable measure.

Keywords: Meloidogyne, Cymbopogon citratus, Tagetes erecta, Azadirachta indica, nematicidal

Procedia PDF Downloads 165
562 Assessment of Conventional Drinking Water Treatment Plants as Removal Systems of Virulent Microsporidia

Authors: M. A. Gad, A. Z. Al-Herrawy

Abstract:

Microsporidia comprises various pathogenic species can infect humans by means of water. Moreover, chlorine disinfection of drinking-water has limitations against this protozoan pathogen. A total of 48 water samples were collected from two drinking water treatment plants having two different filtration systems (slow sand filter and rapid sand filter) during one year period. Samples were collected from inlet and outlet of each plant. Samples were separately filtrated through nitrocellulose membrane (142 mm, 0.45 µm), then eluted and centrifuged. The obtained pellet from each sample was subjected to DNA extraction, then, amplification using genus-specific primer for microsporidia. Each microsporidia-PCR positive sample was performed by two species specific primers for Enterocytozoon bieneusi and Encephalitozoon intestinalis. The results of the present study showed that the percentage of removal for microsporidia through different treatment processes reached its highest rate in the station using slow sand filters (100%), while the removal by rapid sand filter system was 81.8%. Statistically, the two different drinking water treatment plants (slow and rapid) had significant effect for removal of microsporidia. Molecular identification of microsporidia-PCR positive samples using two different primers for Enterocytozoon bieneusi and Encephalitozoon intestinalis showed the presence of the two pervious species in the inlet water of the two stations, while Encephalitozoon intestinalis was detected in the outlet water only. In conclusion, the appearance of virulent microsporidia in treated drinking water may cause potential health threat.

Keywords: removal, efficacy, microsporidia, drinking water treatment plants, PCR

Procedia PDF Downloads 212
561 Mitigation Measures for the Acid Mine Drainage Emanating from the Sabie Goldfield: Case Study of the Nestor Mine

Authors: Rudzani Lusunzi, Frans Waanders, Elvis Fosso-Kankeu, Robert Khashane Netshitungulwana

Abstract:

The Sabie Goldfield has a history of gold mining dating back more than a century. Acid mine drainage (AMD) from the Nestor mine tailings storage facility (MTSF) poses a serious threat to the nearby ecosystem, specifically the Sabie River system. This study aims at developing mitigation measures for the AMD emanating from the Nestor MTSF using materials from the Glynns Lydenburg MTSF. The Nestor MTSF (NM) and the Glynns Lydenburg MTSF (GM) each provided about 20 kg of bulk composite samples. Using samples from the Nestor MTSF and the Glynns Lydenburg MTSF, two mixtures were created. MIX-A is a mixture that contains 25% weight percent (GM) and 75% weight percent (NM). MIX-B is the name given to the second mixture, which contains 50% AN and 50% AG. The same static test, i.e., acid–base accounting (ABA), net acid generation (NAG), and acid buffering characteristics curve (ABCC) was used to estimate the acid-generating probabilities of samples NM and GM for MIX-A and MIX-B. Furthermore, the mineralogy of the Nestor MTSF samples consists of the primary acid-producing mineral pyrite as well as the secondary minerals ferricopiapite and jarosite, which are common in acidic conditions. The Glynns Lydenburg MTSF samples, on the other hand, contain primary acid-neutralizing minerals calcite and dolomite. Based on the assessment conducted, materials from the Glynns Lydenburg are capable of neutralizing AMD from Nestor MTSF. Therefore, the alkaline tailings materials from the Glynns Lydenburg MTSF can be used to rehabilitate the acidic Nestor MTSF.

Keywords: Nestor Mine, acid mine drainage, mitigation, Sabie River system

Procedia PDF Downloads 86
560 Anomaly Detection of Log Analysis using Data Visualization Techniques for Digital Forensics Audit and Investigation

Authors: Mohamed Fadzlee Sulaiman, Zainurrasyid Abdullah, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin

Abstract:

In common digital forensics cases, investigation may rely on the analysis conducted on specific and relevant exhibits involved. Usually the investigation officer may define and advise digital forensic analyst about the goals and objectives to be achieved in reconstructing the trail of evidence while maintaining the specific scope of investigation. With the technology growth, people are starting to realize the importance of cyber security to their organization and this new perspective creates awareness that digital forensics auditing must come in place in order to measure possible threat or attack to their cyber-infrastructure. Instead of performing investigation on incident basis, auditing may broaden the scope of investigation to the level of anomaly detection in daily operation of organization’s cyber space. While handling a huge amount of data such as log files, performing digital forensics audit for large organization proven to be onerous task for the analyst either to analyze the huge files or to translate the findings in a way where the stakeholder can clearly understand. Data visualization can be emphasized in conducting digital forensic audit and investigation to resolve both needs. This study will identify the important factors that should be considered to perform data visualization techniques in order to detect anomaly that meet the digital forensic audit and investigation objectives.

Keywords: digital forensic, data visualization, anomaly detection , log analysis, forensic audit, visualization techniques

Procedia PDF Downloads 287
559 Islamophobia, Years After 9/11: An Assessment of the American Media

Authors: Nasa'i Muhammad Gwadabe

Abstract:

This study seeks to find the extent to which the old Islamophobic prejudice was tilted towards a more negative direction in the United States following the 9/11 terrorist attacks. It is hypothesized that, the 9/11 attacks in the United States reshaped the old Islamophobic prejudice through the reinforcement of a strong social identity construction of Muslims as “out-group”. The “social identity” and “discourse representation” theories are used as framework for analysis. To test the hypothesis, two categories were created: the prejudice (out-group) and the tolerance (in-group) categories. The Prejudice (out-group) against Muslims category was coded to include six attributes: (Terrorist, Threat, Women's Rights violation, Undemocratic, Backward and Intolerant); while the tolerance (In-group) for Muslims category was also coded to include six attributes: (Peaceful, civilized, educated, partners trustworthy and honest). Data are generated from the archives of three American newspapers: The Los Angeles Times, New York Times and USA Today using specific search terms and specific date range; from 9/11/1996 to 9/11/2006, that is five years before and five years after the 9/11. An aggregate of 20595 articles were generated from the search of the three newspapers throughout the search periods. Conclusively, for both pre and post 9/11 periods, the articles generated under the category of prejudice (out-group) against Muslims revealed a higher frequency, against that of tolerance (in-group) for them, which is lesser. Finally, The comparison between the pre and post 9/11 periods showed that, the increased Prejudice (out-group) against Muslims was most influenced through libeling them as terrorist, which signaled a skyrocketed increase from pre to post 9/11.

Keywords: in-group, Islam, Islamophobia, Muslims, out-group, prejudice, terrorism, the 9/11 and tolerance

Procedia PDF Downloads 305
558 The Combination of Curcuma Extract and IgG Colostrum on Strongyloides Infection in CD1 Mice

Authors: Laurentius J. M. Rumokoy, Jimmy Posangi, Wisje Lusia Toar, Julio Lopez Aban

Abstract:

The threat of pathogen infection agents to the neonates is a major health problem to the new born life livestock. Neonate losses became an important case in the world as well as in Indonesia. This condition can be triggered by an infection with nematode in conjunction with a failure of immunoglobulin passive transfer. The study was conducted to evaluate the role of the curcuma combined with IgG colostrum on the development of parasites in the gut of CD1 mice. Animal experiments were divided in four groups (G) based on the treatment: G1 (infection only); G2 (curcuma+infection), G3 (IgG + infection) and G4 (curcuma+IgG+infection). The parameters measured were EPG (eggs per gram) and female in the intestine. The results obtained showed that the treatment has no a significant influence on the number of eggs per gram of feces in the group infected compared to the control group without receiving IgG nor curcuma. However, the EGP response tended to decrease at day 6 in G3 and G4 with a minimum number at zero eggs. This performant showed that the immunoglobulin-G and curcuma substances could slightly decreased the number of eggs in animal infected with Strongyloides. The results obtained showed also that the treatment has no significant difference (P > 0.05) on female larva in the gut of MCD1 experimental. In other side, we found that the best performance to inhibit the female quantity in the gut was the treatment with IgG and infection of parasite in G3. In this treatment, the minimum number was five female only in the gut. The results described IgG response was better than the curcuma single use in reducing the female parasite in the gut. This positive response of IgG compared to other controls group was associated with the function of colostrum antibodies.

Keywords: parasites, livestock, curcuma, colostrums

Procedia PDF Downloads 176