Search results for: active cyber defence
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3989

Search results for: active cyber defence

3449 Unified Power Quality Conditioner Presentation and Dimensioning

Authors: Abderrahmane Kechich, Othmane Abdelkhalek

Abstract:

Static converters behave as nonlinear loads that inject harmonic currents into the grid and increase the consumption of the inactive power. On the other hand, the increased use of sensitive equipment requires the application of sinusoidal voltages. As a result, the electrical power quality control has become a major concern in the field of power electronics. In this context, the active power conditioner (UPQC) was developed. It combines both serial and parallel structures; the series filter can protect sensitive loads and compensate for voltage disturbances such as voltage harmonics, voltage dips or flicker when the shunt filter compensates for current disturbances such as current harmonics, reactive currents and imbalance. This double feature is that it is one of the most appropriate devices. Calculating parameters is an important step and in the same time it’s not easy for that reason several researchers based on trial and error method for calculating parameters but this method is not easy for beginners researchers especially what about the controller’s parameters, for that reason this paper gives a mathematical way to calculate of almost all of UPQC parameters away from trial and error method. This paper gives also a new approach for calculating of PI regulators parameters for purpose to have a stable UPQC able to compensate for disturbances acting on the waveform of line voltage and load current in order to improve the electrical power quality.

Keywords: UPQC, Shunt active filer, series active filer, PI controller, PWM control, dual-loop control

Procedia PDF Downloads 403
3448 MR Enterography Findings in Pediatric and Adult Patients with Crohn's Disease

Authors: Karolina Siejka, Monika Piekarska, Monika Zbroja, Weronika Cyranka, Maryla Kuczynska, Magdalena Grzegorczyk, Malgorzata Nowakowska, Agnieszka Brodzisz, Magdalena Maria Wozniak

Abstract:

Crohn’s disease is one of chronic inflammatory bowel diseases. It is increasing in prevalence worldwide, especially with young people. The disease usually occurs in the second to the fourth decade of life. Traditionally is diagnosed by clinical indicates, endoscopic, and histological findings. Magnetic Resonance Enterography (MRE) can demonstrate mural and extramural inflammatory signs and complications, which make it a valuable diagnostic modality. The study included 76 adults and 36 children diagnosed with Crohn’s disease. Each patient underwent MRE with intravenous administration of a contrast agent. All the studies were performed using Siemens Aera 1.5T scanner according to a local study protocol. Whenever applicable, MR Enterography findings were verified with endoscopy. Forty adults and all 36 children had an active phase of Crohn’s disease; five adults had a chronic phase of the disease; one adult had both chronic and active inflammatory features. Thirty adults have no sings of pathology. In both adult and pediatric groups the most commonly observed manifestation of active disease was thickened edematous ileum wall (26 adults and 36 children). Adults had Bauhin’s valve edema in 58% cases (n=23) and mesenteric changes in 34% cases (n=9). To compare, 32 children had Bauhin’s valve edema (89%) and, in 23 cases, was found inflammatory infiltration of the peri-intestinal fat (64%). The involvement of the large intestine was more common among children (100%). Complications of Crohn’s disease were found commonly in adults (40% of adults, 22% of children). There were observed 18 fistulas (14 adults, four children) and six abscesses (2 adults, four children). MRE is a reliable method in the evaluation of Crohn’s disease activity, especially of its complications. The lack of radiations makes MRE well-tolerated modality, which can be often repeated, particularly in young patients. The disease had different medical sings depending on age – children often had a more active inflammatory process, but there were more complications in the adult group.

Keywords: Crohn's disease, diagnostics, inflammatory bowel disease, magnetic resonance enterography, MRE

Procedia PDF Downloads 183
3447 A Hybrid Tabu Search Algorithm for the Multi-Objective Job Shop Scheduling Problems

Authors: Aydin Teymourifar, Gurkan Ozturk

Abstract:

In this paper, a hybrid Tabu Search (TS) algorithm is suggested for the multi-objective job shop scheduling problems (MO-JSSPs). The algorithm integrates several shifting bottleneck based neighborhood structures with the Giffler & Thompson algorithm, which improve efficiency of the search. Diversification and intensification are provided with local and global left shift algorithms application and also new semi-active, active, and non-delay schedules creation. The suggested algorithm is tested in the MO-JSSPs benchmarks from the literature based on the Pareto optimality concept. Different performances criteria are used for the multi-objective algorithm evaluation. The proposed algorithm is able to find the Pareto solutions of the test problems in shorter time than other algorithm of the literature.

Keywords: tabu search, heuristics, job shop scheduling, multi-objective optimization, Pareto optimality

Procedia PDF Downloads 444
3446 Identification of Bioactive Metabolites from Ficus carica and Their Neuroprotective Effects of Alzheimer's Disease

Authors: Hanan Khojah, RuAngelie Edrada-Ebel

Abstract:

Neurodegenerative disease including Alzheimer’s disease is a major cause of long-term disability. Oxidative stress is frequently implicated as one of the key contributing factors to neurodegenerative diseases. Protection against neuronal damage remains a great challenge for researchers. Ficus carica (commonly known as fig) is a species of great antioxidant nutritional value comprising a protective mechanism against innumerable health disorders related to oxidative stress as well as Alzheimer’s disease. The purpose of this work was to characterize the non-polar active metabolites in Ficus carica endocarp, mesocarp, and exocarp. Crude extracts were prepared using several extraction solvents, which included 1:1 water: ethylacetate, acetone and methanol. The dried extracts were then solvent partitioned between equivalent amounts of water and ethylacetate. Purification and fractionation were accomplished by high-throughput chromatography. The isolated metabolites were tested on their effect on human neuroblastoma cell line by cell viability test and cell cytotoxicity assay with acrolein. Molecular weights of the active metabolites were determined via LC–HRESIMS and GC-EIMS. Metabolomic profiling was performed to identify the active metabolites by using differential expression analysis software (Mzmine) and SIMCA for multivariate analysis. Structural elucidation and identification of the interested active metabolites were studied by 1-D and 2-D NMR. Significant differences in bioactivity against a concentration-dependent assay on acrolein radicals were observed between the three fruit parts. However, metabolites obtained from mesocarp and the endocarp demonstrated bioactivity to scavenge ROS radical. NMR profiling demonstrated that aliphatic compounds such as γ-sitosterol tend to induce neuronal bioactivity and exhibited bioactivity on the cell viability assay. γ-Sitosterol was found in higher concentrations in the mesocarp and was considered as one of the major phytosterol in Ficus carica.

Keywords: alzheimer, Ficus carica, γ-Sitosterol, metabolomics

Procedia PDF Downloads 345
3445 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 228
3444 Training in Communicational Skills in Students of Medicine: Differences in Bilingualism

Authors: Naiara Ozamiz Etcebarria, Sonia Ruiz De Azua Garcia, Agurtzane Ortiz Jauregi, Virginia Guillen Cañas

Abstract:

Introduction: The most relevant competencies of a health professional are an adequate communication capacity, which will influence the satisfaction of professionals and patients, therapeutic compliance, conflict prevention, clinical outcomes´ improvement and efficiency of health services. The ability of Active listening , empathy, assertiveness and social skills, are important abilities to develop in all professions in which there is a relationship with other people. In the field of health, it is even more important to have adequate qualities so that the treatment with the patient will be adequate and satisfactory. We conducted a research with students of third year in the Degree of Medicine with the objectives: - to know how the active listening, empathy, assertiveness and social skills of students are. - to know if there are differences according to different demographic variables, such as sex, language, age, number of siblings and interest in the subject. Material and Methods: The students of the Third year in the Degree of Medicine (N = 212) participated voluntarily. Sociodemographic data were collected. Descriptive and comparative analysis of the averages of the students with respect to active listening, empathy, assertiveness and social skills were performed. Once the questionnaires were collected, they were entered into the SPSS 21 database. Four communicational aspects were evaluated: The active listening questionnaire, the TECA empathy questionnaire, the ACDA questionnaire and the EHS questionnaire Social Skills Scale. The active listening questionnaire assesses these factors: Listening without interruption and less contradiction, Listening with 100% attention, Listening beyond words, Listening encouraging the other to go deeper. The TECA questionnaire of cognitive and affective empathy evaluates: Adoption of perspectives, Emotional Comprehension, Emphasizing stress, Empathic joy. The EHS questionnaire Social Skills Scale: Self-expression in social situations, Defending one's own rights as a consumer, Expressing anger or dissatisfaction, Refusing to do and cutting interactions off, Making requests, Initiating positive interactions with the other sex. The ACDA questionnaire Assertiveness Assessment Scale evaluates self-assertiveness and heteroaservitivity. Applicability: To train these skills is so important for clinical practice of medical students and these capabilities that can be measured in a longitudinal way time. Ethical-legal aspects: The data were anonymous. The study was approved by the Ethics Committee. Results: The students of the Third year in the Degree of Medicine (34.4% Basque speakers and 65.6% Spanish speakers) with average age 20.93, (27.8% men and 72.2% women). There are no differences in social skills between men and women. The Basque speaker students of are more heteroactive (ACDA) than Spanish students. Active listening has a high correlation with social skills, especially with self-expression in social situations. Listening without interruption has a high correlation with self-expression in social situations and initiating positive interactions with the opposite sex. Adoption of perspectives presents a high correlation with auto- assertiveness. Emotional understanding presents a high correlation with positive interactions with the opposite sex. Empathic joy correlates with self-assertiveness, self-expression in social situations, and initiating positive interactions with the opposite sex.

Keywords: active listening, assertiveness, communicational skills, empathy, students of medicine

Procedia PDF Downloads 303
3443 Active Learning Methods in Mathematics

Authors: Daniela Velichová

Abstract:

Plenty of ideas on how to adopt active learning methods in education are available nowadays. Mathematics is a subject where the active involvement of students is required in particular in order to achieve desirable results regarding sustainable knowledge and deep understanding. The present article is based on the outcomes of an Erasmus+ project DrIVE-MATH, that was aimed at developing a novel and integrated framework to teach maths classes in engineering courses at the university level. It is fundamental for students from the early years of their academic life to have agile minds. They must be prepared to adapt to their future working environments, where enterprises’ views are always evolving, where all collaborate in teams, and relations between peers are thought for the well-being of the whole - workers and company profit. This reality imposes new requirements on higher education in terms of adaptation of different pedagogical methods, such as project-based and active-learning methods used within the course curricula. Active learning methodologies are regarded as an effective way to prepare students to meet the challenges posed by enterprises and to help them in building critical thinking, analytic reasoning, and insight to the solved complex problems from different perspectives. Fostering learning-by-doing activities in the pedagogical process can help students to achieve learning independence, as they could acquire deeper conceptual understanding by experimenting with the abstract concept in a more interesting, useful, and meaningful way. Clear information about learning outcomes and goals might help students to take more responsibility for their learning results. Active learning methods implemented by the project team members in their teaching practice, eduScrum and Jigsaw in particular, proved to provide better scientific and soft skills support to students than classical teaching methods. EduScrum method enables teachers to generate a working environment that stimulates students' working habits and self-initiative as they become aware of their responsibilities within the team, their own acquired knowledge, and their abilities to solve problems independently, though in collaboration with other team members. This method enhances collaborative learning, as students are working in teams towards a common goal - knowledge acquisition, while they are interacting with each other and evaluated individually. Teams consisting of 4-5 students work together on a list of problems - sprint; each member is responsible for solving one of them, while the group leader – a master, is responsible for the whole team. A similar principle is behind the Jigsaw technique, where the classroom activity makes students dependent on each other to succeed. Students are divided into groups, and assignments are split into pieces, which need to be assembled by the whole group to complete the (Jigsaw) puzzle. In this paper, analysis of students’ perceptions concerning the achievement of deeper conceptual understanding in mathematics and the development of soft skills, such as self-motivation, critical thinking, flexibility, leadership, responsibility, teamwork, negotiation, and conflict management, is presented. Some new challenges are discussed as brought by introducing active learning methods in the basic mathematics courses. A few examples of sprints developed and used in teaching basic maths courses at technical universities are presented in addition.

Keywords: active learning methods, collaborative learning, conceptual understanding, eduScrum, Jigsaw, soft skills

Procedia PDF Downloads 55
3442 Insider Theft Detection in Organizations Using Keylogger and Machine Learning

Authors: Shamatha Shetty, Sakshi Dhabadi, Prerana M., Indushree B.

Abstract:

About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring.

Keywords: cyber security, machine learning, cyclic process, email notification

Procedia PDF Downloads 58
3441 Machine Learning Methods for Flood Hazard Mapping

Authors: Stefano Zappacosta, Cristiano Bove, Maria Carmela Marinelli, Paola di Lauro, Katarina Spasenovic, Lorenzo Ostano, Giuseppe Aiello, Marco Pietrosanto

Abstract:

This paper proposes a novel neural network approach for assessing flood hazard mapping. The core of the model is a machine learning component fed by frequency ratios, namely statistical correlations between flood event occurrences and a selected number of topographic properties. The proposed hybrid model can be used to classify four different increasing levels of hazard. The classification capability was compared with the flood hazard mapping River Basin Plans (PAI) designed by the Italian Institute for Environmental Research and Defence, ISPRA (Istituto Superiore per la Protezione e la Ricerca Ambientale). The study area of Piemonte, an Italian region, has been considered without loss of generality. The frequency ratios may be used as a standalone block to model the flood hazard mapping. Nevertheless, the mixture with a neural network improves the classification power of several percentage points, and may be proposed as a basic tool to model the flood hazard map in a wider scope.

Keywords: flood modeling, hazard map, neural networks, hydrogeological risk, flood risk assessment

Procedia PDF Downloads 181
3440 An Analytical Metric and Process for Critical Infrastructure Architecture System Availability Determination in Distributed Computing Environments under Infrastructure Attack

Authors: Vincent Andrew Cappellano

Abstract:

In the early phases of critical infrastructure system design, translating distributed computing requirements to an architecture has risk given the multitude of approaches (e.g., cloud, edge, fog). In many systems, a single requirement for system uptime / availability is used to encompass the system’s intended operations. However, when architected systems may perform to those availability requirements only during normal operations and not during component failure, or during outages caused by adversary attacks on critical infrastructure (e.g., physical, cyber). System designers lack a structured method to evaluate availability requirements against candidate system architectures through deep degradation scenarios (i.e., normal ops all the way down to significant damage of communications or physical nodes). This increases risk of poor selection of a candidate architecture due to the absence of insight into true performance for systems that must operate as a piece of critical infrastructure. This research effort proposes a process to analyze critical infrastructure system availability requirements and a candidate set of systems architectures, producing a metric assessing these architectures over a spectrum of degradations to aid in selecting appropriate resilient architectures. To accomplish this effort, a set of simulation and evaluation efforts are undertaken that will process, in an automated way, a set of sample requirements into a set of potential architectures where system functions and capabilities are distributed across nodes. Nodes and links will have specific characteristics and based on sampled requirements, contribute to the overall system functionality, such that as they are impacted/degraded, the impacted functional availability of a system can be determined. A machine learning reinforcement-based agent will structurally impact the nodes, links, and characteristics (e.g., bandwidth, latency) of a given architecture to provide an assessment of system functional uptime/availability under these scenarios. By varying the intensity of the attack and related aspects, we can create a structured method of evaluating the performance of candidate architectures against each other to create a metric rating its resilience to these attack types/strategies. Through multiple simulation iterations, sufficient data will exist to compare this availability metric, and an architectural recommendation against the baseline requirements, in comparison to existing multi-factor computing architectural selection processes. It is intended that this additional data will create an improvement in the matching of resilient critical infrastructure system requirements to the correct architectures and implementations that will support improved operation during times of system degradation due to failures and infrastructure attacks.

Keywords: architecture, resiliency, availability, cyber-attack

Procedia PDF Downloads 110
3439 A Macroeconomic Analysis of Defense Industry: Comparisons, Trends and Improvements in Brazil and in the World

Authors: J. Fajardo, J. Guerra, E. Gonzales

Abstract:

This paper will outline a study of Brazil's industrial base of defense (IDB), through a bibliographic research method, combined with an analysis of macroeconomic data from several available public data platforms. This paper begins with a brief study about Brazilian national industry, including analyzes of productivity, income, outcome and jobs. Next, the research presents a study on the defense industry in Brazil, presenting the main national companies that operate in the aeronautical, army and naval branches. After knowing the main points of the Brazilian defense industry, data on the productivity of the defense industry of the main countries and competing companies of the Brazilian industry were analyzed, in order to summarize big cases in Brazil with a comparative analysis. Concerned the methodology, were used bibliographic research and the exploration of historical data series, in order to analyze information, to get trends and to make comparisons along the time. The research is finished with the main trends for the development of the Brazilian defense industry, comparing the current situation with the point of view of several countries.

Keywords: economics of defence, industry, trends, market

Procedia PDF Downloads 159
3438 Increase of Energy Efficiency by Means of Application of Active Bearings

Authors: Alexander Babin, Leonid Savin

Abstract:

In the present paper, increasing of energy efficiency of a thrust hybrid bearing with a central feeding chamber is considered. The mathematical model was developed to determine the pressure distribution and the reaction forces, based on the Reynolds equation and static characteristics’ equations. The boundary problem of pressure distribution calculation was solved using the method of finite differences. For various types of lubricants, geometry and operational characteristics, axial gaps can be determined, where the minimal friction coefficient is provided. The next part of the study considers the application of servovalves in order to maintain the desired position of the rotor. The report features the calculation results and the analysis of the influence of the operational and geometric parameters on the energy efficiency of mechatronic fluid-film bearings.

Keywords: active bearings, energy efficiency, mathematical model, mechatronics, thrust multipad bearing

Procedia PDF Downloads 283
3437 Performance Evaluation of One and Two Dimensional Prime Codes for Optical Code Division Multiple Access Systems

Authors: Gurjit Kaur, Neena Gupta

Abstract:

In this paper, we have analyzed and compared the performance of various coding schemes. The basic ID prime sequence codes are unique in only dimension, i.e. time slots, whereas 2D coding techniques are not unique by their time slots but with their wavelengths also. In this research, we have evaluated and compared the performance of 1D and 2D coding techniques constructed using prime sequence coding pattern for Optical Code Division Multiple Access (OCDMA) system on a single platform. Analysis shows that 2D prime code supports lesser number of active users than 1D codes, but they are having large code family and are the most secure codes compared to other codes. The performance of all these codes is analyzed on basis of number of active users supported at a Bit Error Rate (BER) of 10-9.

Keywords: CDMA, OCDMA, BER, OOC, PC, EPC, MPC, 2-D PC/PC, λc, λa

Procedia PDF Downloads 337
3436 Performance Analysis of Shunt Active Power Filter for Various Reference Current Generation Techniques

Authors: Vishal V. Choudhari, Gaurao A. Dongre, S. P. Diwan

Abstract:

A number of reference current generation have been developed for analysis of shunt active power filter to mitigate the load compensation. Depending upon the type of load the technique has to be chosen. In this paper, six reference current generation techniques viz. instantaneous reactive power theory(IRP), Synchronous reference frame theory(SRF), Perfect harmonic cancellation(PHC), Unity power factor method(UPF), Self-tuning filter method(STF), Predictive filtering method(PFM) are compared for different operating conditions. The harmonics are introduced because of non-linear loads in the system. These harmonics are eliminated using above techniques. The results and performance of system simulated on MATLAB/Simulink platform. The system is experimentally implemented using DS1104 card of dSPACE system.

Keywords: SAPF, power quality, THD, IRP, SRF, dSPACE module DS1104

Procedia PDF Downloads 592
3435 Artificial Neural Networks Controller for Active Power Filter Connected to a Photovoltaic Array

Authors: Rachid Dehini, Brahim Berbaoui

Abstract:

The main objectives of shunt active power filter (SAPF) is to preserve the power system from unwanted harmonic currents produced by nonlinear loads, as well as to compensate the reactive power. The aim of this paper is to present a (PAPF) supplied by the Photovoltaic cells ,in such a way that the (PAPF) feeds the linear and nonlinear loads by harmonics currents and the excess of the energy is injected into the power system. In order to improve the performances of conventional (PAPF) This paper also proposes artificial neural networks (ANN) for harmonics identification and DC link voltage control. The simulation study results of the new (SAPF) identification technique are found quite satisfactory by assuring good filtering characteristics and high system stability.

Keywords: SAPF, harmonics current, photovoltaic cells, MPPT, artificial neural networks (ANN)

Procedia PDF Downloads 333
3434 Usage of Military Continuity Management System for Supporting of Emergency Management

Authors: Radmila Hajkova, Jiri Palecek, Hana Malachova, Alena Oulehlova

Abstract:

Ensuring of continuity of business is the basic strategy of every company. Continuity of organization activities includes comprehensive procedures that help in solving unexpected situations of natural and anthropogenic character (for example flood, blaze, economic situations). Planning of continuity operations is a process that helps identify critical processes and implement plans for the security and recovery of key processes. The aim of this article demonstrates application of system approach to managing business continuity called business continuity management systems in military issues. This article describes the life cycle of business continuity management which is based on the established cycle PDCA (plan-do-check-act). After this is carried out by activities which are making by the University of Defence during activation of forces and means of the Integrated rescue system in case of emergencies - accidents at a nuclear power plant in Czech republic. Activities of various stages of deployment earmarked forces and resources are managed and evaluated by using MCMS application (military continuity management system).

Keywords: business continuity management system, emergency management, military, nuclear safety

Procedia PDF Downloads 456
3433 The Challenge of Assessing Social AI Threats

Authors: Kitty Kioskli, Theofanis Fotis, Nineta Polemi

Abstract:

The European Union (EU) directive Artificial Intelligence (AI) Act in Article 9 requires that risk management of AI systems includes both technical and human oversight, while according to NIST_AI_RFM (Appendix C) and ENISA AI Framework recommendations, claim that further research is needed to understand the current limitations of social threats and human-AI interaction. AI threats within social contexts significantly affect the security and trustworthiness of the AI systems; they are interrelated and trigger technical threats as well. For example, lack of explainability (e.g. the complexity of models can be challenging for stakeholders to grasp) leads to misunderstandings, biases, and erroneous decisions. Which in turn impact the privacy, security, accountability of the AI systems. Based on the NIST four fundamental criteria for explainability it can also classify the explainability threats into four (4) sub-categories: a) Lack of supporting evidence: AI systems must provide supporting evidence or reasons for all their outputs. b) Lack of Understandability: Explanations offered by systems should be comprehensible to individual users. c) Lack of Accuracy: The provided explanation should accurately represent the system's process of generating outputs. d) Out of scope: The system should only function within its designated conditions or when it possesses sufficient confidence in its outputs. Biases may also stem from historical data reflecting undesired behaviors. When present in the data, biases can permeate the models trained on them, thereby influencing the security and trustworthiness of the of AI systems. Social related AI threats are recognized by various initiatives (e.g., EU Ethics Guidelines for Trustworthy AI), standards (e.g. ISO/IEC TR 24368:2022 on AI ethical concerns, ISO/IEC AWI 42105 on guidance for human oversight of AI systems) and EU legislation (e.g. the General Data Protection Regulation 2016/679, the NIS 2 Directive 2022/2555, the Directive on the Resilience of Critical Entities 2022/2557, the EU AI Act, the Cyber Resilience Act). Measuring social threats, estimating the risks to AI systems associated to these threats and mitigating them is a research challenge. In this paper it will present the efforts of two European Commission Projects (FAITH and THEMIS) from the HorizonEurope programme that analyse the social threats by building cyber-social exercises in order to study human behaviour, traits, cognitive ability, personality, attitudes, interests, and other socio-technical profile characteristics. The research in these projects also include the development of measurements and scales (psychometrics) for human-related vulnerabilities that can be used in estimating more realistically the vulnerability severity, enhancing the CVSS4.0 measurement.

Keywords: social threats, artificial Intelligence, mitigation, social experiment

Procedia PDF Downloads 66
3432 Power and Authority: A Social and Technological Analysis of US and China Competition

Authors: Glory Okereke

Abstract:

The paper examines the strength and influence of superpowers in asserting dominance in international relations through Culture and technological and cyber-power redistribution. The paper is divided into four parts to analyze what constitutes power and authority using realist and constructivist approaches. The second section explores strategic examples of how superpowers assert themselves through values, ideology, and technological warfare, focusing on the redistribution of authority. The third section evaluates whether these strategies enhance power or create greater risks, applying traditional theories of Realism and Constructivism. Finally, the paper challenges these traditional theories by highlighting the risks associated with the quest for power, drawing on the Copenhagen School’s Securitization Theory.

Keywords: US and China relations, great power competition, technology, cultural, asia, united states

Procedia PDF Downloads 6
3431 A Prioritisation Guide for More Sustainable Manufacturing Processes

Authors: Cansu Kandemir, Marco Franchino

Abstract:

To attain sustainability goals, the manufacturing industries must assess and improve their processes, adopt the latest technologies, and ensure minimal environmental impact. Ongoing debates claim that the definition of sustainability and its assessment is vague. Companies struggle with understanding which processes they should prioritise and necessitate a methodology to aid decision-making. For that reason, our investigation focused on defining a prioritisation guide to help to manufacture engineers identify areas of a facility to prioritise de-carbonisation efforts based on existing sources of data. The authors at the University of Sheffield Advanced Manufacturing Research Centre (AMRC) worked with a range of major businesses, including Food and Drink (Moy Park), Automotive (Nissan), Aerospace and Defence (BAE, Meggitt, Leonardo, and GKN) and Technology (Accenture and Intellium AI). Collected information has been integrated into a prioritisation guide framework that helps process comparison and decision-making. The framework developed in this study aims to ensure that companies have guidance on where to focus their efforts whilst striving to fulfil their environmental and societal obligations.

Keywords: decision making, sustainability, carbon emissions, manufacturing

Procedia PDF Downloads 62
3430 Abridging Pharmaceutical Analysis and Drug Discovery via LC-MS-TOF, NMR, in-silico Toxicity-Bioactivity Profiling for Therapeutic Purposing Zileuton Impurities: Need of Hour

Authors: Saurabh B. Ganorkar, Atul A. Shirkhedkar

Abstract:

The need for investigations protecting against toxic impurities though seems to be a primary requirement; the impurities which may prove non - toxic can be explored for their therapeutic potential if any to assist advanced drug discovery. The essential role of pharmaceutical analysis can thus be extended effectively to achieve it. The present study successfully achieved these objectives with characterization of major degradation products as impurities for Zileuton which has been used for to treat asthma since years. The forced degradation studies were performed to identify the potential degradation products using Ultra-fine Liquid-chromatography. Liquid-chromatography-Mass spectrometry (Time of Flight) and Proton Nuclear Magnetic Resonance Studies were utilized effectively to characterize the drug along with five major oxidative and hydrolytic degradation products (DP’s). The mass fragments were identified for Zileuton and path for the degradation was investigated. The characterized DP’s were subjected to In-Silico studies as XP Molecular Docking to compare the gain or loss in binding affinity with 5-Lipooxygenase enzyme. One of the impurity of was found to have the binding affinity more than the drug itself indicating for its potential to be more bioactive as better Antiasthmatic. The close structural resemblance has the ability to potentiate or reduce bioactivity and or toxicity. The chances of being active biologically at other sites cannot be denied and the same is achieved to some extent by predictions for probability of being active with Prediction of Activity Spectrum for Substances (PASS) The impurities found to be bio-active as Antineoplastic, Antiallergic, and inhibitors of Complement Factor D. The toxicological abilities as Ames-Mutagenicity, Carcinogenicity, Developmental Toxicity and Skin Irritancy were evaluated using Toxicity Prediction by Komputer Assisted Technology (TOPKAT). Two of the impurities were found to be non-toxic as compared to original drug Zileuton. As the drugs are purposed and repurposed effectively the impurities can also be; as they can have more binding affinity; less toxicity and better ability to be bio-active at other biological targets.

Keywords: UFLC, LC-MS-TOF, NMR, Zileuton, impurities, toxicity, bio-activity

Procedia PDF Downloads 195
3429 Electrochemical Study of Ni and/or Fe Based Mono- And Bi- Hydroxides

Authors: H. Benaldjia, N. Habib, F. Djefaflia, A. Nait-Merzoug, A. Harat, J. El-Haskouri, O. Guellati

Abstract:

Currently, the technology has attracted knowledge of energy storage sources similar to batteries, capacitors and super-capacitors because of its very different applications in many fields with major social and economic challenges. Moreover, hydroxides have attracted much attention as a promising and active material choice in large-scale applications such as molecular adsorption/storage and separation for the environment, ion exchange, nanotechnology, supercapacitor for energy storage and conversion, electro-biosensing, and catalysts, due to their unique properties which are strongly influenced by their composition, microstructure, and synthesis method. In this context, we report in this study the synthesis of hydroxide-based nanomaterials precisely based on Ni and Fe using a simple hydrothermal method with mono and bi precursors at optimized growth conditions (6h-120°C). The obtained products were characterized using different techniques, such as XRD, FTIR, FESEM and BET, as well as electrochemical measurements.

Keywords: energy storage, Supercapacitors, nanocomposites, nanohybride, electro-active materials.

Procedia PDF Downloads 84
3428 Internally Displaced Persons: Implication to National Development in Nigeria

Authors: Olasunkanmi G. Jeje, John G. Laah, Eunice S. A. Jeje

Abstract:

In recent times Nigeria has been bedeviled with political, religious and ethnic crises such as indigene/settler phenomena, Boko Haram etc. resulting in the emergence of internally displaced persons(IDPs), this has been a hunch on national development. Most states of the federation have had their share of one crisis or the other such as Jos, Yobe, Borno etc thereby affecting the economy of the country. These persons are uprooted from their residential locations of which they are active contributors to the national GDP. In addition, the attempt to rehabilitate them has gulped billions of naira for feeding, shelter and medicals etc., which is not adequate for such. However, the financing could have been used for projects such as capacity building and infrastructural development. Similarly, traumatic experience by this group of people is overwhelming as most of them are mainly the aged, women and children. Importantly, the active roles of youths that constitute the productive sector of the economy have also been truncated. Therefore, it is the prerogative of this research to examine the effect of IDP's on National Development and also to recommend solutions.

Keywords: development, implication, internally displaced persons, Nigeria

Procedia PDF Downloads 317
3427 Determining Efficiency of Frequency Control System of Karkheh Power Plant in Main Network

Authors: Ferydon Salehifar, Hassan Safarikia, Hossein Boromandfar

Abstract:

Karkheh plant in Iran's Khuzestan province and is located in the city Andimeshk. The plant has a production capacity of 400 MW units with water and three hours. One of the important parameters of each country's power grid stability is the stability of the power grid is affected by the voltage and frequency In plants, the amount of active power frequency control is done so that when the unit is placed in the frequency control their productivity is a function of frequency and output power varies with frequency. Produced by hydroelectric power plants with the water level behind the dam has a direct relationship And to decrease and increase the water level behind the dam in order to reduce the power output increases But these changes have a different interval is due to some mechanical problems such as turbine cavitation and vibration are limited. In this study, the range of the frequency control can be Karkheh manufacturing plants have been identified and their effectiveness has been determined.

Keywords: Karkheh power, frequency control system, active power, efficiency

Procedia PDF Downloads 622
3426 Research on Public Space Optimization Strategies for Existing Settlements Based on Intergenerational Friendliness

Authors: Huanhuan Qiang, Sijia Jin

Abstract:

Population aging has become a global trend, and China has entered an aging society, implementing an active aging system focused on home and community-based care. However, most urban communities where elderly people live face issues such as monotonous planning, unappealing landscapes, and inadequate aging infrastructure, which do not meet the requirements for active aging. Intergenerational friendliness and mutual assistance are key components in China's active aging policy framework. Therefore, residential development should prioritize enhancing intergenerational friendliness. Residential and public spaces are central to community life and well-being, offering new and challenging venues to improve relationships among residents of different ages. They are crucial for developing intergenerational communities with diverse generations and non-blood relationships. This paper takes the Maigaoqiao community in Nanjing, China, as a case study, examining intergenerational interactions in public spaces. Based on Maslow's hierarchy of needs and using time geography analysis, it identifies the spatiotemporal behavior characteristics of intergenerational groups in outdoor activities. Then construct an intergenerational-friendly evaluation system and an IPA quadrant model for public spaces in residential areas. Lastly, it explores optimization strategies for public spaces to promote intergenerational friendly interactions, focusing on five aspects: accessibility, safety, functionality, a sense of belonging, and interactivity.

Keywords: intergenerational friendliness, demand theory, spatiotemporal behavior, IPA analysis, existing residential public space

Procedia PDF Downloads 9
3425 A Survey in Techniques for Imbalanced Intrusion Detection System Datasets

Authors: Najmeh Abedzadeh, Matthew Jacobs

Abstract:

An intrusion detection system (IDS) is a software application that monitors malicious activities and generates alerts if any are detected. However, most network activities in IDS datasets are normal, and the relatively few numbers of attacks make the available data imbalanced. Consequently, cyber-attacks can hide inside a large number of normal activities, and machine learning algorithms have difficulty learning and classifying the data correctly. In this paper, a comprehensive literature review is conducted on different types of algorithms for both implementing the IDS and methods in correcting the imbalanced IDS dataset. The most famous algorithms are machine learning (ML), deep learning (DL), synthetic minority over-sampling technique (SMOTE), and reinforcement learning (RL). Most of the research use the CSE-CIC-IDS2017, CSE-CIC-IDS2018, and NSL-KDD datasets for evaluating their algorithms.

Keywords: IDS, imbalanced datasets, sampling algorithms, big data

Procedia PDF Downloads 329
3424 Basics for Corruption Reduction and Fraud Prevention in Industrial/Humanitarian Organizations through Supplier Management in Supply Chain Systems

Authors: Ibrahim Burki

Abstract:

Unfortunately, all organizations (Industrial and Humanitarian/ Non-governmental organizations) are prone to fraud and corruption in their supply chain management routines. The reputational and financial fallout can be disastrous. With the growing number of companies using suppliers based in the local market has certainly increased the threat of fraud as well as corruption. There are various potential threats like, poor or non-existent record keeping, purchasing of lower quality goods at higher price, excessive entertainment of staff by suppliers, deviations in communications between procurement staff and suppliers, such as calls or text messaging to mobile phones, staff demanding extended periods of notice before they allow an audit to take place, inexperienced buyers and more. But despite all the above-mentioned threats, this research paper emphasize upon the effectiveness of well-maintained vendor/s records and sorting/filtration of vendor/s to cut down the possible threats of corruption and fraud. This exercise is applied in a humanitarian organization of Pakistan but it is applicable to whole South Asia region due to the similarity of culture and contexts. In that firm, there were more than 550 (five hundred and fifty) registered vendors. As during the disasters or emergency phases requirements are met on urgent basis thus, providing golden opportunities for the fake companies or for the brother/sister companies of the already registered companies to be involved in the tendering process without declaration or even under some different (new) company’s name. Therefore, a list of required documents (along with checklist) was developed and sent to all of the vendor(s) in the current database and based upon the receipt of the requested documents vendors were sorted out. Furthermore, these vendors were divided into active (meeting the entire set criterion) and non-active groups. This initial filtration stage allowed the firm to continue its work without a complete shutdown that is only vendors falling in the active group shall be allowed to participate in the tenders by the time whole process is completed. Likewise only those companies or firms meeting the set criterion (active category) shall be allowed to get registered in the future along with a dedicated filing system (soft and hard shall be maintained), and all of the companies/firms in the active group shall be physically verified (visited) by the Committee comprising of senior members of at least Finance department, Supply Chain (other than procurement) and Security department.

Keywords: corruption reduction, fraud prevention, supplier management, industrial/humanitarian organizations

Procedia PDF Downloads 540
3423 A Performance Analysis Study of an Active Solar Still Integrating Fin at the Basin Plate

Authors: O. Ansari, H. Hafs, A. Bah, M. Asbik, M. Malha, M. Bakhouya

Abstract:

Water is one of the most important and vulnerable natural resources due to human activities and climate change. Water-level continues declining year after year and it is primarily caused by sustained, extensive, and traditional usage methods. Improving water utilization becomes an urgent issue in order satisfy the increasing population needs. Desalination of seawater or brackish water could help in increasing water potential. However, a cost-effective desalination process is required. The most appropriate method for performing this desalination is solar-driven distillation, given its simplicity, low cost and especially the availability of the solar energy source. The main objective of this paper is to demonstrate the influence of coupling integrated basin plate by fins with preheating by solar collector on the performance of solar still. The energy balance equations for the various elements of the solar still are introduced. A numerical example is used to show the efficiency of the proposed solution.

Keywords: active solar still, desalination, fins, solar collector

Procedia PDF Downloads 221
3422 Examining French Teachers’ Teaching and Learning Approaches in Some Selected Junior High Schools in Ghana

Authors: Paul Koffitse Agobia

Abstract:

In 2020 the Ministry of Education in Ghana and the National Council for Curriculum and Assessment (NaCCA) rolled out a new curriculum, Common Core Programme (CCP) for Basic 7 to 10, that lays emphasis on character building and values which are important to the Ghanaian society by providing education that will produce character–minded learners, with problem solving skills, who can play active roles in dealing with the increasing challenges facing Ghana and the global society. Therefore, learning and teaching approaches that prioritise the use of digital learning resources and active learning are recommended. The new challenge facing Ghanaian teachers is the ability to use new technologies together with the appropriate content pedagogical knowledge to help learners develop, aside the communication skills in French, the essential 21st century skills as recommended in the new curriculum. This article focusses on the pedagogical approaches that are recommended by NaCCA. The study seeks to examine French language teachers’ understanding of the recommended pedagogical approaches and how they use digital learning resources in class to foster the development of these essential skills and values. 54 respondents, comprised 30 teachers and 24 head teachers, were selected in 6 Junior High schools in rural districts (both private and public) and 6 from Junior High schools in an urban setting. The schools were selected in three regions: Volta, Central and Western regions. A class observation checklist and an interview guide were used to collect data for the study. The study reveals that some teachers adopt teaching techniques that do not promote active learning. They demonstrate little understanding of the core competences and values, therefore, fail to integrate them in their lessons. However, some other teachers, despite their lack of understanding of learning and teaching philosophies, adopted techniques that can help learners develop some of the core competences and values. In most schools, digital learning resources are not utilized, though teachers have smartphones or laptops.

Keywords: active learning, core competences, digital learning resources, pedagogical approach, values.

Procedia PDF Downloads 78
3421 New Kinetic Approach to the Enzymatic Hydrolysis of Proteins: A Case of Thermolysin-Catalyzed Albumin

Authors: Anna Trusek-Holownia, Andrzej Noworyta

Abstract:

Using an enzyme of known specificity the hydrolysis of protein was carried out in a controlled manner. The aim was to obtain oligopeptides being the so-called active peptides or their direct precursors. An original way of expression of the protein hydrolysis kinetics was introduced. Peptide bonds contained in the protein were recognized as a diverse-quality substrate for hydrolysis by the applied protease. This assumption was positively verified taking as an example the hydrolysis of albumin by thermolysin. Peptide linkages for this system should be divided into at least four groups. One of them is a group of bonds non-hydrolyzable by this enzyme. These that are broken are hydrolyzed at a rate that differs even by tens of thousands of times. Designated kinetic constants were k'F = 10991.4 L/g.h, k'M = 14.83L/g.h, k'S about 10-1 L/g.h for fast, medium and slow bonds, respectively. Moreover, a procedure for unfolding of the protein, conducive to the improved susceptibility to enzymatic hydrolysis (approximately three-fold increase in the rate) was proposed.

Keywords: peptide bond hydrolysis, kinetics, enzyme specificity, biologically active peptides

Procedia PDF Downloads 437
3420 Development of Bioactive Medical Textiles by Immobilizing Nanoparticles at Cotton Fabric

Authors: Munir Ashraf, Shagufta Riaz

Abstract:

Personal protective equipment (PPE) and bioactive textiles are highly important for the health care of front line hospital workers, patients, and the general population to be safe from highly infectious diseases. This was even more critical in the wake of COVID-19 outbreak. Most of the medical textiles are inactive against various viruses and bacteria, hence there is a need to wash them frequently to avoid the spread of microorganisms. According to survey conducted by the world health organization, more than 500 million people get infected from hospitals, and more than 13 million died due to these hospitals’ acquired deadly diseases. The market available PPE are though effective against the penetration of pathogens and to kill bacteria but, they are not breathable and active against different viruses. Therefore, there was a great need to develop textiles that are not only effective against bacteria, fungi, and viruses but also are comfortable to the medical personnel and patients. In the present study, waterproof breathable, and biologically active textiles were developed using antiviral and antibacterial nanomaterials. These nanomaterials like TiO₂, ZnO, Cu, and Ag were immobilized at the surface of cotton fabric by using different silane coupling agents and electroless deposition that they retained their functionality even after 30 industrial laundering cycles. Afterwards, the treated fabrics were coated with a waterproof breathable film to prevent the permeation of liquid droplets, any particle or microorganisms greater than 80 nm. The developed cotton fabric was highly active against bacteria and viruses. The good durability of nanomaterials at the cotton surface after several industrial washing cycles makes this fabric an ideal candidate for bioactive textiles used in the medical field.

Keywords: antibacterial, antiviral, cotton, durable

Procedia PDF Downloads 183