Search results for: Development of a security group
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 24056

Search results for: Development of a security group

23516 Enhancing Coping Strategies of Student: A Case Study of 'Choice Theory' Group Counseling

Authors: Warakorn Supwirapakorn

Abstract:

The purpose of this research was to study the effects of choice theory in group counseling on coping strategies of students. The sample consisted of 16 students at a boarding school, who had the lowest score on the coping strategies. The sample was divided into two groups by random assignment and then were assigned into the experimental group and the control group, with eight members each. The instruments were the Adolescent Coping Scale and choice theory group counseling program. The data collection procedure was divided into three phases: The pre-test, the post-test, and the follow-up. The data were analyzed by repeated measure analysis of variance: One between-subjects and one within-subjects. The results revealed that the interaction between the methods and the duration of the experiment was found statistically significant at 0.05 level. The students in the experimental group demonstrated significantly higher at 0.05 level on coping strategies score in both the post-test and the follow-up than in the pre-test and the control group. No significant difference was found on coping strategies during the post-test phase and the follow-up phase of the experimental group.

Keywords: coping strategies, choice theory, group counseling, boarding school

Procedia PDF Downloads 191
23515 The Students' Mathematical Competency and Attitude towards Mathematics Using the Trachtenberg Speed Math System

Authors: Marlone D. Severo

Abstract:

A pre- and post-test quasi-experimental design was used to test the intervention of Trachtenberg Speed Math on the mathematical competency of sixty (60) matched-paired students with a poor performing grade in Mathematics from one of the biggest public national high school at the South of Metro Manila. Both control and experimental group were administered with the Attitude Towards Mathematics Inventory (ATMI) before the pretest were given and both group showed high dislike for Mathematics. Pretest showed a 53 percent accuracy for the control group and 51 percent for the experimental group using a 15-item long multiplication test without any aid of a computing device. The experimental group were taught how to use the Trachtenberg number-keys and techniques in multiplication between October 2014 to March 2015. Post-test showed an improvement in the experimental group with 96 percent accuracy for the control group and a dismal 57 percent for the control group in long-multiplication. Post-test ATMI were administered. The control group showed a great dislike towards Mathematics, while the experimental group showed a positive attitude towards the subject.

Keywords: attitude towards mathematics, mathematical competency, number-keys, trachtenberg speed math

Procedia PDF Downloads 348
23514 Basics of SCADA Security: A Technical Approach

Authors: Michał Witas

Abstract:

This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.

Keywords: denial of service, SCADA, security policy, distributed network

Procedia PDF Downloads 353
23513 Evaluation of Progesterone and Estradiol17-ß Levels in Ewes Induced with Different Methods

Authors: E. Sinem Ozdemir Salci, Nazmiye Gunes, Guven Ozkaya, Gulsen Goncagul, Kamil Seyrek Intas

Abstract:

The aim of this study was to show the effects of progesterone and estrogen concentrations in ewes induced with different induction of parturition methods. Twenty-four healthy ewes (n=24) on 138th gestation day were randomly separated according to induction methods (group I (n=6), (0.09% NaCl), group II (n=6) (dexamethasone, 16 mg im.), group III (n=6) (aglepristone 5mg/kg sc.) and group IV (n=6) (aglepristone, 2,5 mg/kg sc.+dexamethasone 8 mg im.). The blood samples of the ewes were collected at 12 hours intervals from induction time to the postpartum 2nd day in order to determine progesterone and estradiol 17-ß levels. These hormone concentrations were determined by ELISA, and obtained results were statistically analyzed with Kruskal Wallis and Dunn tests between the groups, and Friedman and Wilcoxon test within the groups. The results pointed out that there was no significant difference within the groups in terms of estradiol 17-ß (group 1, p=0.508; group 2, p=0.054; group 3, p=0.672; group 4, p=0,170). And there was only a significant difference at 138th day (p=0,019) between groups II and IV (p=0,010). There was a significant difference in terms of progesterone concentration within group 1, 2 and 4 (p=0.000). And there was a significant difference at all times except 138th day between the groups (p<0.05). As a conclusion, the induction of parturition methods could be performed successfully. These methods have no effect on estradiol 17-ß concentration but also make changings on progesterone concentrations as in groups 3 and 4.

Keywords: ewe, estradiol 17-ß, induction of parturition, progesterone

Procedia PDF Downloads 202
23512 Level Of Gross Motor Development And Age Equivalents Of 9-Year-Old Children

Authors: Ahmad Hashim, Masri Baharom

Abstract:

The purpose of the study is to identify the age group of children 9 who have experienced delays in gross motor development. Instrument used in this study is Test Gross Motor Development / TGMD-2 (Ulrich, 2000) which was adopted at the international level. Gross motor development data were obtained by video recording (Sony (DRC-SR42 with a 40x optical zoom capability, and software Ultimate Studio 14) on locomotor and manipulative skills. A total n = 192 persons, children of 9 years (9.30 ± .431) at Sekolah Kebangsaan Mutiara Perdana, Bayan Lepas, Penang were involved as subjects. Children age 9 years experienced delays AELS (4.61 ± .69), AEMS (5:52 ± .62) and GMDQ (7.26 ± .2.14). The findings based on descriptive rating indicated that the performance of children age 9 years acquired low levels of AELS, MSS, AEMS and very low in LSS and GMDS.

Keywords: gross motor development score, locomotor standard score, age equivalent locomotor score, manipulative standard score, age equivalent manipulative score

Procedia PDF Downloads 395
23511 An Investigation of Performance Versus Security in Cognitive Radio Networks with Supporting Cloud Platforms

Authors: Kurniawan D. Irianto, Demetres D. Kouvatsos

Abstract:

The growth of wireless devices affects the availability of limited frequencies or spectrum bands as it has been known that spectrum bands are a natural resource that cannot be added. Many studies about available spectrum have been done and it shows that licensed frequencies are idle most of the time. Cognitive radio is one of the solutions to solve those problems. Cognitive radio is a promising technology that allows the unlicensed users known as secondary users (SUs) to access licensed bands without making interference to licensed users or primary users (PUs). As cloud computing has become popular in recent years, cognitive radio networks (CRNs) can be integrated with cloud platform. One of the important issues in CRNs is security. It becomes a problem since CRNs use radio frequencies as a medium for transmitting and CRNs share the same issues with wireless communication systems. Another critical issue in CRNs is performance. Security has adverse effect to performance and there are trade-offs between them. The goal of this paper is to investigate the performance related to security trade-off in CRNs with supporting cloud platforms. Furthermore, Queuing Network Models with preemptive resume and preemptive repeat identical priority are applied in this project to measure the impact of security to performance in CRNs with or without cloud platform. The generalized exponential (GE) type distribution is used to reflect the bursty inter-arrival and service times at the servers. The results show that the best performance is obtained when security is disable and cloud platform is enable.

Keywords: performance vs. security, cognitive radio networks, cloud platforms, GE-type distribution

Procedia PDF Downloads 328
23510 Digital Image Steganography with Multilayer Security

Authors: Amar Partap Singh Pharwaha, Balkrishan Jindal

Abstract:

In this paper, a new method is developed for hiding image in a digital image with multilayer security. In the proposed method, the secret image is encrypted in the first instance using a flexible matrix based symmetric key to add first layer of security. Then another layer of security is added to the secret data by encrypting the ciphered data using Pythagorean Theorem method. The ciphered data bits (4 bits) produced after double encryption are then embedded within digital image in the spatial domain using Least Significant Bits (LSBs) substitution. To improve the image quality of the stego-image, an improved form of pixel adjustment process is proposed. To evaluate the effectiveness of the proposed method, image quality metrics including Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), entropy, correlation, mean value and Universal Image Quality Index (UIQI) are measured. It has been found experimentally that the proposed method provides higher security as well as robustness. In fact, the results of this study are quite promising.

Keywords: Pythagorean theorem, pixel adjustment, ciphered data, image hiding, least significant bit, flexible matrix

Procedia PDF Downloads 320
23509 The Effect of 'Teachers Teaching Teachers' Professional Development Course on Teachers’ Achievement and Classroom Practices

Authors: Nuri Balta, Ali Eryilmaz

Abstract:

High-quality teachers are the key to improve student learning. Without a professional development of the teachers, the improvement of student success is difficult and incomplete. This study offers an in-service training course model for professional development of teachers (PD) entitled "teachers teaching teachers" (TTT). The basic premise of the PD program, designed for this study, was primarily aimed to increase the subject matter knowledge of high school physics teachers. The TTT course (the three hour long workshops), organized for this study, lasted for seven weeks with seventeen teachers took part in the TTT program at different amounts. In this study, the effect of the TTT program on teachers’ knowledge improvement was searched through the modern physics unit (MPU). The participating teachers taught the unit to one of their grade ten classes earlier, and they taught another equivalent class two months later. They were observed in their classes both before and after TTT program. The teachers were divided into placebo and the treatment groups. The aim of Solomon four-group design is an attempt to eliminate the possible effect of pre-test. However, in this study the similar design was used to eliminate the effect of pre teaching. The placebo group teachers taught their both classes as regular and the treatment group teachers had TTT program between the two teachings. The class observation results showed that the TTT program increased teachers’ knowledge and skills in teaching MPU. Further, participating in the TTT program caused teachers to teach the MPU in accordance with the requirements of the curriculum. In order to see any change in participating teachers’ success, an achievement test was applied to them. A large effect size (dCohen=.93) was calculated for the effect of TTT program on treatment group teachers’ achievement. The results suggest that staff developers should consider including topics, attractive to teachers, in-service training programs (a) to help teachers’ practice teaching the new topics (b) to increase the participation rate. During the conduction of the TTT courses, it was observed that teachers could not end some discussions and explain some concepts. It is now clear that teachers need support, especially when discussing counterintuitive concepts such as modern physics concepts. For this reason it is recommended that content focused PD programs be conducted at the helm of a scholarly coach.

Keywords: high school physics, in-service training course, modern physics unit, teacher professional development

Procedia PDF Downloads 180
23508 Geothermal Resources to Ensure Energy Security During Climate Change

Authors: Debasmita Misra, Arthur Nash

Abstract:

Energy security and sufficiency enables the economic development and welfare of a nation or a society. Currently, the global energy system is dominated by fossil fuels, which is a non-renewable energy resource, which renders vulnerability to energy security. Hence, many nations have begun augmenting their energy system with renewable energy resources, such as solar, wind, biomass and hydro. However, with climate change, how sustainable are some of the renewable energy resources in the future is a matter of concern. Geothermal energy resources have been underexplored or underexploited in global renewable energy production and security, although it is gaining attractiveness as a renewable energy resource. The question is, whether geothermal energy resources are more sustainable than other renewable energy resources. High-temperature reservoirs (> 220 °F) can produce electricity from flash/dry steam plants as well as binary cycle production facilities. Most of the world’s high enthalpy geothermal resources are within the seismo-tectonic belt. However, exploration for geothermal energy is of great importance in conventional geothermal systems in order to improve its economic viability. In recent years, there has been an increase in the use and development of several exploration methods for geo-thermal resources, such as seismic or electromagnetic methods. The thermal infrared band of the Landsat can reflect land surface temperature difference, so the ETM+ data with specific grey stretch enhancement has been used to explore underground heat water. Another way of exploring for potential power is utilizing fairway play analysis for sites without surface expression and in rift zones. Utilizing this type of analysis can improve the success rate of project development by reducing exploration costs. Identifying the basin distribution of geologic factors that control the geothermal environment would help in identifying the control of resource concentration aside from the heat flow, thus improving the probability of success. The first step is compiling existing geophysical data. This leads to constructing conceptual models of potential geothermal concentrations which can then be utilized in creating a geodatabase to analyze risk maps. Geospatial analysis and other GIS tools can be used in such efforts to produce spatial distribution maps. The goal of this paper is to discuss how climate change may impact renewable energy resources and how could a synthesized analysis be developed for geothermal resources to ensure sustainable and cost effective exploitation of the resource.

Keywords: exploration, geothermal, renewable energy, sustainable

Procedia PDF Downloads 136
23507 Allopurinol Prophylactic Therapy in the Prevention of Contrast Induced Nephropathy in High Risk Patients Undergoing Coronary Angiography: A Prospective Randomized Controlled Trial

Authors: Seyed Fakhreddin Hejazi, Leili Iranirad, Mohammad Sadeghi, Mohsen Talebizadeh

Abstract:

Background: Contrast-induced nephropathy (CIN) remains to be a potentially serious complication of radiographic procedures. We performed this clinical trial to assess the preventive effect of allopurinol against CIN in high-risk patients undergoing coronary angiography. Methods: In this prospective randomized controlled trial, 140 patients with at least two risk factors for CIN undergoing coronary angiography were randomly assigned to either the allopurinol group or the control group. Patients in the allopurinol group received 300 mg allopurinol 24 hours before a procedure and intravenous hydration for 12 hours before and after coronary angiography, whereas patients in the control group received intravenous hydration. Serum creatinine (SCr), blood urea nitrogen (BUN) and uric acid were measured before contrast exposure and at 48 hours. CIN was defined as an increase of 25% in serum creatinine (SCr) or >0.5 mg/dl 48 hours after contrast administration. Results: CIN occurred in 11 out of 70 (7.9%) patients in the control group and in 8 out of 70 (5.7%) patients in the allopurinol group. There was no significant difference in the incidence of CIN between the two groups at 48 hours after administering the radiocontrast agent (p = 0.459). However, there were significant differences between the two groups in SCr, BUN, uric acid, and eGFR 48 hours after radiocontrast administration (p < 0.05). Conclusion: Our findings revealed that allopurinol had no substantial efficacy over hydration protocol in high-risk patients for the development of CIN.

Keywords: contrast-induced nephropathy, allopurinol, coronary angiography, contrast agent

Procedia PDF Downloads 230
23506 Ice Breakers: A Tool for Esl Learners

Authors: Nazia Shehzad

Abstract:

An icebreaker is a facilitation exercise intended to help a group to begin the process of forming themselves into a team. Icebreakers are commonly presented as a game to ‘warm up’ the group by helping the members to get to know each other. They often focus on sharing personal information such as names, hobbies, etc. Challenging icebreakers also have the ability to allow a group to be better prepared to complete its assigned tasks. For example, if the team's objective is to redesign a business process such as Accounts Payable, the icebreaker activity might take the team through a process analysis. The analysis could include the identification of failure points, challenging assumptions, and development of new solutions — all in a simpler and ‘safer’ setting where the team can practice the group dynamics which they will use to solve the assigned problem. Icebreakers help establish a positive environment and provide an opportunity for students to get to know one another and the instructor. Both are critical to the retention and success of students. There are a number of benefits of using ice-breakers activities in the classroom. It reduces both student and instructor anxiety prior to introducing the course, fosters in a powerful way both student-student and faculty-student interactions. It creates an environment where the learner is expected to participate and the instructor is willing to listen, actively engage students from the onset. It conveys the message that the instructor cares about getting to know the students and makes it easier for students to form relationships early in the semester so they can work together both in and out of class.

Keywords: actively engages students, facilitation exercise, faculty- student interactions, group dynamics, warm up

Procedia PDF Downloads 328
23505 Fracking the UK's Shale Gas Regulatory Regime

Authors: Yanal Abul Failat

Abstract:

The production of oil and natural gas from shale formations is becoming a trend, and many countries with technically and economically recoverable unconventional resources are endeavoring to explore how shale formations may benefit the economy and achieve energy security. The trajectory of shale gas development in the UK is highly supported by the government; in the Gas Generation Strategy Paper published by the UK government on 5 December 2013, it is recognized that the shale gas production would decrease reliance on imports and thus enhance the UK’s energy security. Moreover, the UK Institute of Directors report on UK Shale Gas Potential explains that in the UK there is a potential of production peaking at around 1.13 trillion cubic feet (“tcf”) and a sector that could support around 70,000 jobs and secure net benefit to the Treasury in tax revenues. On this basis, there has been a growing interest in the benefits of exploring the UK’s shale gas but a combination of technical challenges faced in shale gas operations, a stern opposition by environmentalists and concerns on the adequacy of the legal framework have slowed the progress of the emerging UK shale industry.

Keywords: shale gas, UK, legal, oil and gas, energy

Procedia PDF Downloads 692
23504 Novel Fluorescent High Density Polyethylene Composites for Fused Deposition Modeling 3D Printing in Packaging Security Features

Authors: Youssef R. Hassan, Mohamed S. Hasanin, Reda M. Abdelhameed

Abstract:

Recently, innovations in packaging security features become more important to see the originality of packaging in industrial application. Luminescent 3d printing materials have been a promising property which can provides a unique opportunity for the design and application of 3D printing. Lack emission of terbium ions, as a source of green emission, in salt form prevent its uses in industrial applications, so searching about stable and highly emitter material become essential. Nowadays, metal organic frameworks (MOFs) play an important role in designing light emitter material. In this work, fluorescent high density polyethylene (FHDPE) composite filament with Tb-benzene 1,3,5-tricarboxylate (Tb-BTC) MOFs for 3D printing have been successfully developed.HDPE pellets were mixed with Tb-BTC and melting extrustion with single screw extruders. It was found that Tb-BTCuniformly dispersed in the HDPE matrix and significantly increased the crystallinity of PE, which not only maintained the good thermal property but also improved the mechanical properties of Tb-BTC@HDPE composites. Notably, the composite filaments emitted ultra-bright green light under UV lamp, and the fluorescence intensity increased as the content of Tb-BTC increased. Finally, several brightly luminescent exquisite articles could be manufactured by fused deposition modeling (FDM) 3D printer with these new fluorescent filaments. In this context, the development of novel fluorescent Tb-BTC@HDPE composites was combined with 3D printing technology to amplified the packaging Security Features.

Keywords: 3D printing, fluorescent, packaging, security

Procedia PDF Downloads 82
23503 Innovative Technology to Sustain Food Security in Qatar

Authors: Sana Abusin

Abstract:

Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). Achieving food security requires three actions: 1) transforming surplus food to those who are insecure; 2) reducing food loss and waste by recycling food into valuable resources such as compost (“green fertilizer”) that can be used in growing food; and, finally, 3) establishing strong enforcement agencies to protect consumers from outdated food and promote healthy food. Currently, these objectives are approached separately and not in a sustainable fashion. Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). The study aims to develop an innovative mobile application that supports a sustainable solution to food insecurity and food waste in Qatar. The application will provide a common solution for many different users. For producers, it will facilitate easy disposal of excess food. For charities, it will notify them about surplus food ready for redistribution. The application will also benefit the second layer of end-users in the form of food recycling companies, who will receive information about available food waste that is unable to be consumed. We will use self-exoplanetary diagrams and digital pictures to show all the steps to the final stage. The aim is to motivate the young generation toward innovation and creation, and to encourage public-private collaboration in this sector.

Keywords: food security, innovative technology, sustainability, food waste, Qatar

Procedia PDF Downloads 97
23502 Household Energy Usage in Nigeria: Emerging Advances for Sustainable Development

Authors: O. A. Akinsanya

Abstract:

This paper presents the emerging trends in household energy usage in Nigeria for sustainable development. The paper relied on a direct appraisal of energy use in the residential sector and the use of a structured questionnaire to establish the usage pattern, energy management measures and emerging advances. The use of efficient appliances, retrofitting, smart building and smart attitude are some of the benefitting measures. The paper also identified smart building, prosumer activities, hybrid energy use, improved awareness, and solar stand-alone street/security lights as the trend and concluded that energy management strategies would result in a significant reduction in the monthly bills and peak loads as well as the total electricity consumption in Nigeria and therefore it is good for sustainable development.

Keywords: household, energy, trends, strategy, sustainable, Nigeria

Procedia PDF Downloads 46
23501 Methods Used to Perform Requirements Elicitation for Healthcare Software Development

Authors: Tang Jiacheng, Fang Tianyu, Liu Yicen, Xiang Xingzhou

Abstract:

The proportion of healthcare services is increasing throughout the globe. The convergence of mobile technology is driving new business opportunities, innovations in healthcare service delivery and the promise of a better life tomorrow for different populations with various healthcare needs. One of the most important phases for the combination of health care and mobile applications is to elicit requirements correctly. In this paper, four articles from different research directions with four topics on healthcare were detailed analyzed and summarized. We identified the underlying problems in guidance to develop mobile applications to provide healthcare service for Older adults, Women in menopause, Patients undergoing covid. These case studies cover several elicitation methods: survey, prototyping, focus group interview and questionnaire. And the effectiveness of these methods was analyzed along with the advantages and limitations of these methods, which is beneficial to adapt the elicitation methods for future software development process.

Keywords: healthcare, software requirement elicitation, mobile applications, prototyping, focus group interview

Procedia PDF Downloads 123
23500 Changes in Postural Stability after Coordination Exercise

Authors: Ivan Struhár, Martin Sebera, Lenka Dovrtělová

Abstract:

The aim of this study was to find out if the special type of exercise with elastic cord can improve the level of postural stability. The exercise programme was conducted twice a week for 3 months. The participants were randomly divided into an experimental group and a control group. The electronic balance board was used for testing of postural stability. All participants trained for 18 hours at the time of experiment without any special form of coordination programme. The experimental group performed 90 minutes plus of coordination exercise. The result showed that differences between pre-test and post-test occurred in the experimental group. It was used the nonparametric Wilcoxon t-test for paired samples (p=0.012; the significance level 95%). We calculated effect size by Cohen´s d. In the experimental group d is 1.96 which indicates a large effect. In the control group d is 0.04 which confirms no significant improvement.

Keywords: balance board, balance training, coordination, stability

Procedia PDF Downloads 376
23499 The Effects of Ellagic Acid on Rat Liver Induced Tobacco Smoke

Authors: Nalan Kaya, Elif Erdem, Mehmet Ali Kisacam, Gonca Ozan, Enver Ozan

Abstract:

Tobacco smokers continuously inhale thousands of carcinogens and free radicals. It is estimated that about 1017 oxidant molecules are present in each puff of tobacco smoke. It is known that smoking has adverse effects on the structure and functions of the liver. Ellagic acid (EA) has antioxidant, antiapoptotic, anticarcinogenic, antibacterial and antiinflammatory effects. The aim of our study was to investigate the possible protective effect of ellagic acid against tobacco smoke-mediated oxidative stress in the rat liver. Twenty-four male adult (8 weeks old) Spraque-Dawley rats were divided randomly into 4 equal groups: group I (control), group II (tobacco smoke), group III (tobacco smoke + corn oil) and group IV (tobacco smoke + ellagic acid). The rats in group II, III and IV, were exposed to tobacco smoke 1 hour twice a day for 12 weeks. In addition to tobacco smoke exposure, 12 mg/kg ellagic acid (dissolved in corn oil), was applied to the rats in group IV by oral gavage. An equal amount of corn oil used in solving ellagic acid was applied to the rats by oral gavage in group III. At the end of the experimental period, rats were decapitated, and liver tissues were removed. Histological and biochemical analyzes were performed. Sinusoidal dilatation, inflammatory cell infiltration in portal area, increased Kuppfer cells were examined in tobacco smoke group and tobacco smoke+ corn oil groups. The results, observed in tobacco smoke and tobacco smoke+corn oil groups, were found significantly decreased in tobacco smoke+EA group. Group-II and group-III MDA levels were significantly higher, and GSH activities were not different than group-I. Compared to group-II, group-IV MDA level was decreased, and GSH activities was increased significantly. The results indicate that ellagic acid could protect the liver tissue from the tobacco smoke harmful effects.

Keywords: ellagic acid, liver, rat, tobacco smoke

Procedia PDF Downloads 279
23498 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022

Authors: Mojtaba Fayaz, Richard Hallal

Abstract:

This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.

Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks

Procedia PDF Downloads 103
23497 Integrated Model for Enhancing Data Security Performance in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 456
23496 South Asia as an Emerging Region of the World in the 21st Century

Authors: Shazia Shinwari

Abstract:

In the 21st century, South Asia is becoming one of the rising sub-regions of the world. In the whole of Asia, South Asia is going to be the center part of opportunities, development, and challenges. The increasing economy and its geopolitical importance are changing the landscape of South Asia. Despite intensifying the opportunities and development, the region is also facing the challenges of security, poverty, and conflicts. It is one of the most populated sub-regions and has many internal conflicts because of which the region remains for a long time a least developed region in the world. But now South Asia is transforming into the developing process and trying to utilize its potentials and to remove the hurdles in the way of development. South Asia is one of the distinctive regions of the world and could play an important role at the global level if the potentials of the region are properly utilized. South Asia is one of the most important regions of the world and assumed more importance after the British withdrawal from the region. Now South Asia is playing an important role in world politics due to its strategic and geographical location. That is why the importance of this region in the international political systems cannot be ignored. Day by day, changes have been taking place in the structure of the global economy, and South Asia could take advantage of these changes to advance as an economic region. For this, South Asia will need to look at its history, and that changes, particularly in the India and Pakistan relations, are necessary for the development of the South Asian region. Despite having challenges in the region, South Asia is also rising as the land of opportunities and development if the potentials of the region are properly utilized and smoothen the way for regional integration.

Keywords: challenges, development, opportunities, South Asia

Procedia PDF Downloads 175
23495 Antioxidants Reveal Protection against the Biochemical Changes in Liver, Kidney, and Blood Profiles after Clindamycin/Ibuprofen Administration in Dental Patients

Authors: Gouda K. Helal, Marwa I. Shabayek, Heba A. El-Ramly, Heba A. Awida

Abstract:

The adverse effects of Clindamycin (Clind.) / Ibuprofen (Ibu.) combination on liver, kidney, blood elements and the significances of antioxidants (N-acetylcysteine and Zinc) against these effects were evaluated. The study includes: Group I; control n=30, Group II; patients on Clind.300mg/Ibu.400mg twice daily for a week n=30, Group III; patients on Clind.300mg/Ibu.400mg+N-acetylcysteine 200mg twice daily for a week n=15 and Group IV; patients on Clind.300mg/Ibu.400mg+Zinc50mg twice daily for a week n=15. Serum malondialdehyde (MDA), alanine transferase (ALT), aspartate transferase (AST), γ glutamyl transferase (GGT), creatinine, blood urea nitrogen (BUN) were measured. Applying one way ANOVA followed by Tuckey Kramer post test, Group II showed significant increase in ALT, AST, GGT, BUN and decrease in Hb, RBCs, platelets than Group I. Group III showed significant decrease in ALT, AST, GGT, BUN than Group II. Moreover, Group IV showed significant decrease in ALT, AST, GGT and increase in Hb, RBCs, and platelets than Group II. Conclusively, Adding Zinc or N-acetylcysteine buffer the oxidative stress and improve the therapeutic outcome of Clindamycin/Ibuprofen combination.

Keywords: clindamycin, ibuprofen, adverse effects, antioxidant, zinc, N-acetylcysteine

Procedia PDF Downloads 359
23494 Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems

Authors: Borhan Marzougui

Abstract:

Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives.

Keywords: IoT, DDoS, attacks, botnet, security, agents

Procedia PDF Downloads 122
23493 Urban Security through Urban Transformation: Case of Saraycik District

Authors: Emir Sunguroglu, Merve Sunguroglu, Yesim Aliefendioglu, Harun Tanrivermis

Abstract:

Basic human needs range from physiological needs such as food, water and shelter to safety needs such as security, protection from natural disasters and even urban terrorism which are extant and not fulfilled even in urban areas where people live civilly in large communities. These basic needs when arose in urban life lead to a different kind of crime set defined as urban crimes. Urban crimes mostly result from differences between socioeconomic conditions in society. Income inequality increases tendency towards urban crimes. Especially in slum areas and suburbs, urban crimes not only threaten public security but they also affect deliverance of public services. It is highlighted that, construction of urban security against problems caused by urban crimes is not only achieved by involvement of urban security in security of the community but also comprises juridical development and staying above a level of legal standards concurrently. The idea of urban transformation emerged as interventions to demolishment and rebuilding of built environment to solve the unhealthy urban environment, inadequate infrastructure and socioeconomic problems came up during the industrialization process. Considering the probability of urbanization process driving citizens to commit crimes, The United Nations Commission on Human Security’s focus on this theme is conferred to be a proper approach. In this study, the analysis and change in security before, through and after urban transformation, which is one of the tools related to urbanization process, is strived to be discussed through the case of Sincan County Saraycik District. The study also aims to suggest improvements to current legislation on public safety, urban resilience, and urban transformation. In spite of Saraycik District residing in a developing County in Ankara, Turkey, from urbanization perspective as well as socioeconomic and demographic indicators the District exhibits a negative view throughout the County and the country. When related to the county, rates of intentional harm reports, burglary reports, the offense of libel and threat reports and narcotic crime reports are higher. The District is defined as ‘crime hotspot’. Interviews with residents of Saraycik claim that the greatest issue of the neighborhood is Public Order and Security (82.44 %). The District becomes prominent with negative aspects, especially with the presence of unlicensed constructions, occurrence of important social issues such as crime and insecurity and complicated lives of inhabitants from poverty and low standard conditions of living. Additionally, the social structure and demographic properties and crime and insecurity of the field have been addressed in this study. Consequently, it is claimed that urban crime rates were related to level of education, employment and household income, poverty trap, physical condition of housing and structuration, accessibility of public services, security, migration, safety in terms of disasters and emphasized that urban transformation is one of the most important tools in order to provide urban security.

Keywords: urban security, urban crimes, urban transformation, Saraycik district

Procedia PDF Downloads 284
23492 The Development of Local-Global Perceptual Bias across Cultures: Examining the Effects of Gender, Education, and Urbanisation

Authors: Helen J. Spray, Karina J. Linnell

Abstract:

Local-global bias in adulthood is strongly dependent on environmental factors and a global bias is not the universal characteristic of adult perception it was once thought to be: whilst Western adults typically demonstrate a global bias, Namibian adults living in traditional villages possess a strong local bias. Furthermore, environmental effects on local-global bias have been shown to be highly gender-specific; whereas urbanisation promoted a global bias in urbanised Namibian women but not men, education promoted a global bias in urbanised Namibian men but not women. Adult populations, however, provide only a snapshot of the gene-environment interactions which shape perceptual bias. Yet, to date, there has been little work on the development of local-global bias across environmental settings. In the current study, local-global bias was assessed using a similarity-matching task with Navon figures in children aged between 4 and 15 years from across three populations: traditional Namibians, urban Namibians, and urban British. For the two Namibian groups, measures of urbanisation and education were obtained. Data were subjected to both between-group and within-group analyses. Between-group analyses compared developmental trajectories across population and gender. These analyses revealed a global bias from even as early as 4 in the British sample, and showed that the developmental onset of a global bias is not fixed. Urbanised Namibian children ultimately developed a global bias that was indistinguishable from British children; however, a global bias did not emerge until much later in development. For all populations, the greatest developmental effects were observed directly following the onset of formal education. No overall gender effects were observed; however, there was a significant gender by age interaction which was difficult to reconcile with existing biological-level accounts of gender differences in the development of local-global bias. Within-group analyses compared the effects of urbanisation and education on local-global bias for traditional and urban Namibian boys and girls separately. For both traditional and urban boys, education mediated all effects of age and urbanisation; however, this was not the case for girls. Traditional Namibian girls retained a local bias regardless of age, education, or urbanisation, and in urbanised girls, the development of a global bias was not attributable to any one factor specifically. These results are broadly consistent with aforementioned findings that education promoted a global bias in urbanised Namibian men but not women. The development of local-global bias does not follow a fixed trajectory but is subject to environmental control. Understanding how variability in the development of local-global bias might arise, particularly in the context of gender, may have far-reaching implications. For example, a number of educationally important cognitive functions (e.g., spatial ability) are known to show consistent gender differences in childhood and local-global bias may mediate some of these effects. With education becoming an increasingly prevalent force across much of the developing world it will be important to understand the processes that underpin its effects and their implications.

Keywords: cross-cultural, development, education, gender, local-global bias, perception, urbanisation, urbanization

Procedia PDF Downloads 124
23491 The Development Practice and SystemConstruction of Low- Carbon City in China

Authors: Xu Xiao China, Xu Lei China

Abstract:

After the 1990s, the concept of urban sustainable development has been increasing attention in urban planning and urban design. High carbon city, not a sustainable city construction model, has become an important problem which restricts the sustainable development of the city. Therefore, low-carbon city construction is the urgent need to solve the problem, and China is one of the core areas of low-carbon city construction in the world. The research work of low-carbon cities were participated by the Chinese government and academic institutes on theory and practice since 2007, and nowadays it comes to a practice stage with six low-carbon pilot provinces and 36 low-carbon pilot cities identified. To achieve the low-carbon target, developing low-carbon energy, adopting non-pollution technique, constructing green buildings and adopting ecolife-style are suggest by the government. Meanwhile, besides a new standard system and a new eco-environmental status evaluation method, the government also established the Chinese urban development institute including the Low-Carbon City Group. Finally, we want to transform the modern industrial civilization into an ecological civilization and realize sustainable urban development.

Keywords: low-carbon city, China, development practice, system construction, urban sustainability

Procedia PDF Downloads 502
23490 Teratogenic Effect of Bisphenol A in Development of Balb/C Mouse

Authors: Nazihe Sedighi, Mohsen Nokhbatolphoghaei

Abstract:

Bisphenol A (BPA) is a monomer used in the manufacture of polycarbonate plastics. Due to having properties such as transparency, heat and impact resistance, it is used widely in medicine, sorts, electronic components, and food containers. It is also used in the production of resins which is applied for lining cans. BPA releases from resins and polycarbonate when it is heated or continuously used the containers from which BPA can enter the body. There are several reports indicating the presence of BPA in the placenta, amniotic fluid, and the embryo itself. While researchers investigated the teratogenic effect of BPA on embryos, very limited work has been done on the effects of BPA when applied from early stages of development. In this study, The teratogenic effect of BPA was investigated at earliest preimplantation (day zero) through day 15.5 of the development of Balb/C mouse embryos. After ensuring the pregnancy via observing vaginal plug, Pregnant mice were divided into five groups. For the three experimental groups, the amount of 500, 750, and 1000 mg/kg/d Bisphenol A was given orally according to body weight. The sham group that was treated with sesame oil, which was used as vehicle and control group remained intact. On day 18.5 of gestation, embryos were removed from the uterus. Randomly half of the embryo were fixed in Bouin for tissue analysis. The other half were prepared for skeletal system staining using Alizarin Red and alcian blue dies. The results showed that the embryonic weight and the crown-rump length of embryos decreased significantly (P < 0.05) in all experimental groups compared to the control group and the sham. In this study, skeletal abnormalities such as delay in ossification of skull and limbs as well as the deviation in the backbone were seen. This research suggests that pregnant mothers need to be aware of possible teratogenic effects of BPA at any stage of pregnancy especially from early to mid stages. In this case, pregnant mothers may need to stop using any manufacture of polycarbonate plastics, as a container for food or drinking.

Keywords: bisphenol A, development, polycarbonate plastic, skeletal system, teratogenicity

Procedia PDF Downloads 280
23489 Pervasive Computing: Model to Increase Arable Crop Yield through Detection Intrusion System (IDS)

Authors: Idowu Olugbenga Adewumi, Foluke Iyabo Oluwatoyinbo

Abstract:

Presently, there are several discussions on the food security with increase in yield of arable crop throughout the world. This article, briefly present research efforts to create digital interfaces to nature, in particular to area of crop production in agriculture with increase in yield with interest on pervasive computing. The approach goes beyond the use of sensor networks for environmental monitoring but also by emphasizing the development of a system architecture that detect intruder (Intrusion Process) which reduce the yield of the farmer at the end of the planting/harvesting period. The objective of the work is to set a model for setting up the hand held or portable device for increasing the quality and quantity of arable crop. This process incorporates the use of infrared motion image sensor with security alarm system which can send a noise signal to intruder on the farm. This model of the portable image sensing device in monitoring or scaring human, rodent, birds and even pests activities will reduce post harvest loss which will increase the yield on farm. The nano intelligence technology was proposed to combat and minimize intrusion process that usually leads to low quality and quantity of produce from farm. Intranet system will be in place with wireless radio (WLAN), router, server, and client computer system or hand held device e.g PDAs or mobile phone. This approach enables the development of hybrid systems which will be effective as a security measure on farm. Since, precision agriculture has developed with the computerization of agricultural production systems and the networking of computerized control systems. In the intelligent plant production system of controlled greenhouses, information on plant responses, measured by sensors, is used to optimize the system. Further work must be carry out on modeling using pervasive computing environment to solve problems of agriculture, as the use of electronics in agriculture will attracts more youth involvement in the industry.

Keywords: pervasive computing, intrusion detection, precision agriculture, security, arable crop

Procedia PDF Downloads 385
23488 Eco-Literacy and Pedagogical Praxis in the Multidisciplinary University Greenhouse toward the Food Security Strengthening

Authors: Citlali Aguilera Lira, David Lynch Steinicke, Andrea León García

Abstract:

One of the challenges that higher education faces is to find how to approach the sustainability in an inclusive way to the student within all the different academic areas, how to move the sustainable development from the abstract field to the operational field. This research comes from the ecoliteracy and the pedagogical praxis as tools for rebuilding the teaching processes inside of universities. The purpose is to determine and describe which are the factors involved in the process of learning particularly in the Greenhouse-School Siembra UV. In the Greenhouse-School Siembra UV, of the University of Veracruz, are cultivated vegetables, medicinal plants and small cornfields under the usage of eco-technologies such as hydroponics, Wickingbed and Hugelkultur, which main purpose is the saving of space, labor and natural resources, as well as function as agricultural production alternatives in the urban and periurban zones. The sample was formed with students from different academic areas and who are actively involved in the greenhouse, as well as institutes from the University of Veracruz and governmental and non-governmental departments. This project comes from a pedagogic praxis approach, from filling the needs that the different professional profiles of the university students have. All this with the purpose of generate a pragmatic dialogue with the sustainability. It also comes from the necessity to understand the factors that intervene in the students’ praxis. In this manner is how the students are the fundamental unit in the sphere of sustainability. As a result, it is observed that those University of Veracruz students who are involved in the Greenhouse-school, Siembra UV, have enriched in different levels the sense of urban and periurban agriculture because of the diverse academic approaches they have and the interaction between them. It is concluded that the eco-technologies act as fundamental tools for ecoliteracy in society, where it is strengthen the nutritional and food security from a sustainable development approach.

Keywords: farming eco-technologies, food security, multidisciplinary, pedagogical praxis

Procedia PDF Downloads 304
23487 Community Based Psychosocial Intervention Reduces Maternal Depression and Infant Development in Bangladesh

Authors: S. Yesmin, N. F.Rahman, R. Akther, T. Begum, T. Tahmid, T. Chowdury, S. Afrin, J. D. Hamadani

Abstract:

Abstract: Maternal depression is one of the risk factors of developmental delay in young children in low-income countries. Maternal depressions during pregnancy are rarely reported in Bangladesh. Objectives: The purpose of the present study was to examine the efficacy of a community based psychosocial intervention on women with mild to moderate depressive illness during the perinatal period and on their children from birth to 12 months on mothers’ mental status and their infants’ growth and development. Methodology: The study followed a prospective longitudinal approach with a randomized controlled design. Total 250 pregnant women aged between 15 and 40 years were enrolled in their third trimester of pregnancy of which 125 women were in the intervention group and 125 in the control group. Women in the intervention group received the “Thinking Healthy (CBT based) program” at their home setting, from their last month of pregnancy till 10 months after delivery. Their children received psychosocial stimulation from birth till 12 months. The following instruments were applied to get the outcome information- Bangla version of Edinburgh Postnatal Depression Scale (BEPDS), Prenatal Attachment Inventory (PAI), Maternal Attachment Inventory (MAI), Bayley Scale of Infant Development-Third version (Bayley–III) and Family Care Indicator (FCI). In addition, sever morbidity; breastfeeding, immunization, socio-economic and demographic information were collected. Data were collected at three time points viz. baseline, midline (6 months after delivery) and endline (12 months after delivery). Results: There was no significant difference between any of the socioeconomic and demographic variables at baseline. A very preliminary analysis of the data shows an intervention effect on Socioemotional behaviour of children at endline (p<0.001), motor development at midline (p=0.016) and at endline (p=0.065), language development at midline (p=0.004) and at endline (p=0.023), cognitive development at midline (p=0.008) and at endline (p=0.002), and quality of psychosocial stimulation at midline (p=0.023) and at endline (p=0.010). EPDS at baseline was not different between the groups (p=0.419), but there was a significant improvement at midline (p=0.027) and at endline (p=0.024) between the groups following the intervention. Conclusion: Psychosocial intervention is found effective in reducing women’s low and moderate depressive illness to cope with mental health problem and improving development of young children in Bangladesh.

Keywords: mental health, maternal depression, infant development, CBT, EPDS

Procedia PDF Downloads 255