Search results for: cyber defense
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 714

Search results for: cyber defense

174 Cerebrum Maturity Damage Induced by Fluoride in Suckling Mice

Authors: Hanen Bouaziz, Françoise Croute, Najiba Zeghal

Abstract:

In order to investigate the toxic effects of fluoride on cerebrum maturity of suckling mice, we treated adult female mice of Swiss Albinos strain by 500 ppm NaF in their drinking water from the 15th day of pregnancy until the day 14 after delivery. All mice were sacrificed on day 14 after parturition. During treatment, levels of thiobarbituric acid reactive substances, the marker of lipid peroxidation extend, increased, while the activities of the antioxidant enzymes such as glutathione peroxidase, superoxide dismutase and catalase and the level of glutathione decreased significantly in cerebellum compared with those of the control group. These results suggested that fluoride enhanced oxidative stress, thereby disturbing the antioxidant defense of nursing pups. In addition, acetylcholinesterase activity in cerebellum was inhibited after treatment with fluoride. In cerebellum of mice, migration of neurons from the external granular layer to the internal granular layer occurred postnatally. Key guidance signals to these migrating neurons were provided by laminin, an extracellular matrix protein fixed to the surface of astrocytes. In the present study, we examined the expression and distribution of laminin in cerebellum of 14-day-old mice. Immunoreactive laminin was disappeared by postnatal day 14 in cerebellum parenchyma of control pups and was restricted to vasculature despite the continued presence of granular cells in the external granular layer. In contrast, in cerebellum of NaF treated pups, laminin was deposited in organised punctuate clusters in the molecular layer. These data indicated that the disruption of laminin distribution might play a major role in the profound derangement of neuronal migration observed in cerebellum of NaF treated pups.

Keywords: acetylcholinesterase activity, cerebellum, laminin, oxidative stress, suckling mice

Procedia PDF Downloads 374
173 Intercultural Sensitivity in Iran: A Case Study of Intercultural Relations between Turks and Lors

Authors: Sepideh Mohammadi

Abstract:

Iran is a country that boasts of ethnic diversity, comprising various groups such as Turks, Lors, Arabs, Baluchs, Persians, Kurds, Gliks, Azaris, and Tabaris. The majority of people in Iran are Persians and as such, the Persian language is the official language of the country. However, it is also a common language among different ethnic groups. It is worth noting that there is a longstanding history of coexistence and cultural relations between the Turkic and Lor ethnic groups. The purpose of this article is to study the range of intercultural sensitivities of Turks and Lor peoples to identify the state of intercultural competence and reduce conflicts in the direction of cultural policy. It is important to gain insight into the mutual perceptions of Lor and Turkic people towards each other. Understanding these perceptions can greatly aid in fostering stronger relationships and promoting effective communication between the two ethnic groups. The study employed a qualitative content analysis approach to gather data using a semi-structured interview tool. The participants consisted of ten individuals from the Lor ethnic and ten individuals from the Turk ethnic. According to Milton Bennett's six-stage model, our findings reveal that the Turkish and Lor ethnic groups tend to exhibit higher intercultural sensitivity in the second stage, which consists of defense against differences. Both groups tend to emphasize the differences between them, and the notion of "us and the other" holds significant importance for them. It is important to acknowledge that both the Turk and Lor ethnicities consist of various clans, which significantly shape intercultural relations between them. A common stereotype in this regard is that the Turks of Tabriz province often do not recognize the Turks of other provinces of the country as their own. Moreover, our study indicates that an increase in interaction and communication between the Lor and Turk ethnic groups may lead to a reduction in cultural sensitivities between them.

Keywords: intercultural communication, intercultural sensitivity, Iran, Lor, Turk

Procedia PDF Downloads 25
172 Susceptibility of Different Clones of Eucalyptus Species against Gall Wasp, Leptocybe invasa Fisher and La Salle in Punjab, India

Authors: Ashwinder K. Dhaliwal, G. P. S. Dhillon

Abstract:

Eucalyptus is one of the most important forest tree species that can tolerate and grow well on degraded and unfertile soils which are not suitable for other tree species. Besides this, these trees have a short rotation and good economic value. However, the gall inducing wasp Leptocybe invasa Fisher and La Salle has been reported from many countries throughout the world. The spread of L. invasa is of huge economic concern as more than 20,000 ha of young Eucalyptus trees have already been affected in southern states of India. The host plant resistance being the first line of defense against insect pests demands the screening of different germplasm source against L. invasa. Keeping this in view, fourteen different clones of Eucalyptus spp. were evaluated for their susceptibility to L. invasa from a replicated clonal trial planted at Punjab Agricultural University, Ludhiana. The degree of gall infestation was recorded from three plants of each clone in each replication. Three branches selected from the lower, middle and upper canopy of the trees were selected for recording the total number of galls induced by L. invasa. The statistical analysis was done as per the procedure laid down for completely randomised block design (CRBD), analysis of variance (ANOVA), critical difference (CD) and variance components using Proc GLM (SAS software 9.3, SAS Institute Ltd. U.S.A). All possible treatment means were compared with Duncan’s multiple range test (DMRT) at 1 % probability level. The results showed that the clones C-9, C-45 and C-42 were completely free from the infestation of L. invasa. However, there was minor infestation of L. invasa on C-2135, C-413, C-407, C-35, C-72 and C-37 clones. The clone C-6 was severely infested by L. invasa followed by C-11, C-12, F-316 and C-25 clones. The information generated by this study will be helpful for future breeding and use in afforestation programmes.

Keywords: eucalyptus clones, gall wasp, Leptocybe invasa, screening, susceptibility

Procedia PDF Downloads 198
171 Technology Futures in Global Militaries: A Forecasting Method Using Abstraction Hierarchies

Authors: Mark Andrew

Abstract:

Geopolitical tensions are at a thirty-year high, and the pace of technological innovation is driving asymmetry in force capabilities between nation states and between non-state actors. Technology futures are a vital component of defence capability growth, and investments in technology futures need to be informed by accurate and reliable forecasts of the options for ‘systems of systems’ innovation, development, and deployment. This paper describes a method for forecasting technology futures developed through an analysis of four key systems’ development stages, namely: technology domain categorisation, scanning results examining novel systems’ signals and signs, potential system-of systems’ implications in warfare theatres, and political ramifications in terms of funding and development priorities. The method has been applied to several technology domains, including physical systems (e.g., nano weapons, loitering munitions, inflight charging, and hypersonic missiles), biological systems (e.g., molecular virus weaponry, genetic engineering, brain-computer interfaces, and trans-human augmentation), and information systems (e.g., sensor technologies supporting situation awareness, cyber-driven social attacks, and goal-specification challenges to proliferation and alliance testing). Although the current application of the method has been team-centred using paper-based rapid prototyping and iteration, the application of autonomous language models (such as GPT-3) is anticipated as a next-stage operating platform. The importance of forecasting accuracy and reliability is considered a vital element in guiding technology development to afford stronger contingencies as ideological changes are forecast to expand threats to ecology and earth systems, possibly eclipsing the traditional vulnerabilities of nation states. The early results from the method will be subjected to ground truthing using longitudinal investigation.

Keywords: forecasting, technology futures, uncertainty, complexity

Procedia PDF Downloads 91
170 Review and Analysis of Sustainable-Based Risk Management in Humanitarian Supply Chains

Authors: Marinko Maslaric, Maja Jokic

Abstract:

When searching for fast and long term responses, sustainable logistics and supply chain applications have developed irrefutable theories and hypotheses towards market requirements. Nevertheless, there are certain misunderstandings on how the implementation of sustainability principles (social, economical, and environmental) and concepts should work in practice, more specifically, within a humanitarian supply chain management context. This paper will focus on the review and analysis of risk management concepts in humanitarian supply chain in order to identify their compliance with sustainable principles. In this direction, the study will look for strategies that suggest: minimization of environmental impacts throughout the reduction of resources consumption, depreciation of logistics costs, including supply chain ones, minimization of transportation and service costs, elaboration of quality performance of supply chain and logistics, and reduction of supply chain delivery time. On the side of meeting all defense, trades and humanitarian logistics needs, the research will be aligned to UN Sustainable Development Goals, standards, and performances. It will start with relevant strategies for identification of risk indicators and it will end with suggestion of valuable strategic approaches for their minimization or total prevention. Finally, a content analysis will propose a suitable methodological structure for the creation of most sustainable strategy in risk management of humanitarian supply chain. Content analysis will accompany thorough, consistent and methodical approach of literature review for potential disaster risk management plan. Thereupon, the propositions of this research will look for contemporary literature gaps, with respect to operate the literature analysis and to suggest the appropriate sustained risk low master plan. The indicated is here to secure the high quality of logistics practices in hazardous events.

Keywords: humanitarian logistics, sustainability, supply chain risk, risk management plan

Procedia PDF Downloads 210
169 The Online Power of Values: Adolescents’ Values as Predicting Factors of Their Online Bystanders’ Behavior While Witnessing Cyberbullying

Authors: Sharon Cayzer-Haller, Shir Ginosar-Yaari, Ariel Knafo-Noam

Abstract:

The 21st century emerged as the digital century, and it is marked by a wide range of technological developments and changes, followed by potential changes in human communication skills. This technological revolution has changed human means of communication in many different ways: children and adolescents are spending much of their time in front of screens, participating in all sorts of online activities (even more so since the outbreak of COVID-19). The current study focuses on the role of values in adolescents' online bystanders' behavior. Values are cognitive, abstract representations of desirable goals that motivate behavior, and we hypothesized finding significant associations between specific values and differential online bystanders' feelings and behavior. Data was collected through online questionnaires that measured the participants' values, using Schwartz's short version of the Portrait Values Questionnaire (Schwartz, 2012). Participants’ online behavior was assessed in a questionnaire addressing reactions to situations of cyber shaming and cyberbullying, and specifically positive feelings and pro-social behavior (e.g., more supportive reactions) toward the victims, as opposed to different offensive behavioral reactions (such as laughing at the victim or ignoring the situation). Participants were recruited with a commercial research panel company, and 308 Israeli adolescents' values and online behavior were examined (mean age 15.2). As hypothesized, results show significant associations between self-transcendence values (universalism and benevolence) and conservation values (conformity, tradition, and security). These two groups of values were positively correlated with pro-social bystanders' feelings and behavior. On the opposite side of the values scale, the value of power was negatively associated with the participants' pro-social behavior, and positively associated with offensive behavioral reactions. Further research is needed, but we conclude that values serve as crucial guiding factors in directing adolescents' online feelings and behavior.

Keywords: adolescents, values, cyberbullying, online behavior, power

Procedia PDF Downloads 43
168 Dynamic Determination of Spare Engine Requirements for Air Fighters Integrating Feedback of Operational Information

Authors: Tae Bo Jeon

Abstract:

Korean air force is undertaking a big project to replace prevailing hundreds of old air fighters such as F-4, F-5, KF-16 etc. The task is to develop and produce domestic fighters equipped with 2 complete-type engines each. A large number of engines, however, will be purchased as products from a foreign engine maker. In addition to the fighters themselves, secure the proper number of spare engines serves a significant role in maintaining combat readiness and effectively managing the national defense budget due to high cost. In this paper, we presented a model dynamically updating spare engine requirements. Currently, the military administration purchases all the fighters, engines, and spare engines at acquisition stage and does not have additional procurement processes during the life cycle, 30-40 years. With the assumption that procurement procedure during the operational stage is established, our model starts from the initial estimate of spare engine requirements based on limited information. The model then performs military missions and repair/maintenance works when necessary. During operation, detailed field information - aircraft repair and test, engine repair, planned maintenance, administration time, transportation pipeline between base, field, and depot etc., - should be considered for actual engine requirements. At the end of each year, the performance measure is recorded and proceeds to next year when it shows higher the threshold set. Otherwise, additional engine(s) will be bought and added to the current system. We repeat the process for the life cycle period and compare the results. The proposed model is seen to generate far better results appropriately adding spare engines thus avoiding possible undesirable situations. Our model may well be applied to future air force military operations.

Keywords: DMSMS, operational availability, METRIC, PRS

Procedia PDF Downloads 151
167 Night Shift Work as an Oxidative Stressor: A Systematic Review

Authors: Madeline Gibson

Abstract:

Night shift workers make up an essential part of the modern workforce. However, night shift workers have higher incidences of late in life diseases and earlier mortality. Night shift workers are exposed to constant light and experience circadian rhythm disruption. Sleep disruption is thought to increase oxidative stress, defined as an imbalance of excess pro-oxidative factors and reactive oxygen species over anti-oxidative activity. Oxidative stress can damage cells, proteins and DNA and can eventually lead to varied chronic diseases such as cancer, diabetes, cardiovascular disease, Alzheimer’s and dementia. This review aimed to understand whether night shift workers were at greater risk of oxidative stress and to contribute to a consensus on this relationship. Twelve studies published in 2001-2019 examining 2,081 workers were included in the review. Studies compared both the impact of working a single shift and in comparisons between those who regularly work night shifts and only day shifts. All studies had evidence to support this relationship across a range of oxidative stress indicators, including increased DNA damage, reduced DNA repair capacity, increased lipid peroxidation, higher levels of reactive oxygen species, and to a lesser extent, a reduction in antioxidant defense. This research supports the theory that melatonin and the sleep-wake cycle mediate the relationship between shift work and oxidative stress. It is concluded that night shift work increases the risk for oxidative stress and, therefore, future disease. Recommendations are made to promote the long-term health of shift workers considering these findings.

Keywords: night shift work, coxidative stress, circadian rhythm, melatonin, disease, circadian rhythm disruption

Procedia PDF Downloads 227
166 Postmodern Navy to Transnational Adaptive Navy: Positive Peace with Borderless Institutional Network

Authors: Serkan Tezgel

Abstract:

Effectively managing threats and power that transcend national boundaries requires a reformulation from the traditional post-modern navy to an adaptive and institutional transnational navy. By analyzing existing soft power concept, post-modern navy, and sea power, this study proposes the transnational navy, founded on the triangle of main attributes of transnational companies, 'Global Competitiveness, Local Responsiveness, Worldwide Learning and Innovation Sharing', a new model which will lead to a positive peace with an institutional network. This transnational model necessitates 'Transnational Navies' to help establish peace with collective and transnational understanding during a transition period 'Reactive Postmodern Navy' has been experiencing. In this regard, it is fairly claimed that a new paradigm shift will revolve around sea power to establish good order at sea with collective and collaborative initiatives and bound to breed new theories and ideas in the forthcoming years. However, there are obstacles to overcome. Postmodern navies, currently shaped by 'Collective Maritime Security' and 'Collective Defense' concepts, can not abandon reactive applications and acts. States deploying postmodern navies to realize their policies on international platforms and seapower structures shaped by the axis of countries’ absolute interests resulted in multipolar alliances and coalitions, but the establishment of the peace. These obstacles can be categorized into three tiers in establishing a unique transnational model navy: Strategic, Organizational and Management challenges. To overcome these obstacles and challenges, postmodern navies should transform into cooperative, collective and independent soft transnational navies with the transnational mentality, global commons, and institutional network. Such an adaptive institution can help the world navigate to a positive peace.

Keywords: postmodern navy, transnational navy, transnational mentality, institutional network

Procedia PDF Downloads 493
165 Using Fly Ash Based Synthetic Zeolite Permeable Reactive Barrier to Remove Arsenic, Cadmium, and their Mixture from Aqueous Solution

Authors: Mozhgan Bahadory, Gholam-Hossein Rostami

Abstract:

Over the next quarter of a century, the US government and the private sector will spend billions of dollars annually to clean the contaminated sites from pollution such as petroleum products, heavy metals, and solvents organic compounds. During the past three decades, almost 750,000 sites that require remediation have been reported to the United States federal and state agencies. Out of these contamination sites, approximately 300,000 are still in need of remediation. In these sites, the most widespread forms of contamination are petroleum products and heavy metals. At least half of US Department of Defense, US Department of Energy, Superfund sites, and Resource Conservation and Recovery Act (RCRA) sites have been reported to contain heavy metals. Heavy metals most often found in the contaminated water are lead, mercury, chromium, cadmium, arsenic, and zinc. This investigation emphasizes the elimination of arsenic and cadmium from aqueous solution. During the past several years, we developed a novel material called Alkali-Activated fly ash Material Permeable Reactive Barrier (AAM-PRB), which includes fly ash, fine aggregates, coarse aggregates, activating chemicals, and water. AAM can be produced with high permeability, 10-1 cm/s, then crushed into pelletized form. Laboratory experiments showed that water containing 10 ppm, 100 ppm, and 1000 ppm of arsenic and cadmium ion passing through AAM-PRB reduced to less than 0.1 ppm. However, water containing 10,000 ppm arsenic ion passing through AAM- PRB shows that the breakthrough was achieved. The removal of the mixture of arsenic and cadmium from aqueous solutions was also tested by using AAM-PRB. The results indicate that the efficiency of AAM-PRB for simultaneous removal of arsenic and cadmium from 10 ppm, 100 ppm, and 1,000 ppm were marginally below that of arsenic alone. Still, it was significantly lower for cadmium from the aqueous solution. The basic science behind removing heavy metal and microstructural investigation AAM-PRB will be the focus of our future work.

Keywords: arsenic, cadmium, contaminated water, fly ash, permeability, reactive barrier

Procedia PDF Downloads 47
164 Vital Pulp Therapy: The Minimally Invasive Endodontic Therapy for Mature Permanent Teeth

Authors: Fadwa Chtioui

Abstract:

Vital Pulp Therapy (VPT) is nowadays challenging the deep-rooted dogma of root canal treatment, being the only therapeutic option for permanent teeth diagnosed with irreversible pulpitis or carious pulp exposure. Histologic and clinical research has shown that compromised dental pulp can be treated without the full removal or excavation of all healthy pulp, and the outcome of the partial or full pulpotomy followed by a Tricalcium-Silicate-based dressing seems to show promising results in maintaining pulp vitality and preserving affected teeth in the long term. By reviewing recent advances in the techniques of VPT and their clinical effectiveness and safety in permanent teeth with irreversible Pulpitis, this work provides a new understanding of pulp pathophysiology and defense mechanisms and will reform dental practitioners' decision-making in treating irreversible pulpits from root canal therapy to vital pulp therapy by taking advantage of the biological effects of Tricalcium Silicate materials. Biography of presenting author: Fadwa Chitoui graduated from the school of Dental Medicine of Monastir, Tunisia, in 2015. After getting her DDS degree with honors, she earned her Postgraduate master's Degree in Endodontics and Restorative Dentistry from her Faculty. Since 2021, she has Started her own private and specialized practice based in the capital Tunis. She enjoys the sphere of associative life, worked with national and international associations, and got engaged in scientific dental research, whereby she tailored her passion for her field of specialty towards broadening her knowledge and ambitions, holding conferences and workshops nationally and internationally and publishing scientific articles in several journals.

Keywords: irreversible pulpitis, permanenet teeth, vital pulp therapy, pulpotomy

Procedia PDF Downloads 48
163 Real-Time Hybrid Simulation for a Tuned Liquid Column Damper Implementation

Authors: Carlos Riascos, Peter Thomson

Abstract:

Real-time hybrid simulation (RTHS) is a modern cyber-physical technique used for the experimental evaluation of complex systems, that treats the system components with predictable behavior as a numerical substructure and the components that are difficult to model as an experimental substructure. Therefore it is an attractive method for evaluation of the response of civil structures under earthquake, wind and anthropic loads. Another practical application of RTHS is the evaluation of control systems, as these devices are often nonlinear and their characterization is an important step in the design of controllers with the desired performance. In this paper, the response of three-story shear frame controlled by a tuned liquid column damper (TLCD) and subject to base excitation is considered. Both passive and semi-active control strategies were implemented and are compared. While the passive TLCD achieved a reduction of 50% in the acceleration response of the main structure in comparison with the structure without control, the semi-active TLCD achieved a reduction of 70%, and was robust to variations in the dynamic properties of the main structure. In addition, a RTHS was implemented with the main structure modeled as a linear, time-invariant (LTI) system through a state space representation and the TLCD, with both control strategies, was evaluated on a shake table that reproduced the displacement of the virtual structure. Current assessment measures for RTHS were used to quantify the performance with parameters such as generalized amplitude, equivalent time delay between the target and measured displacement of the shake table, and energy error using the measured force, and prove that the RTHS described in this paper is an accurate method for the experimental evaluation of structural control systems.

Keywords: structural control, hybrid simulation, tuned liquid column damper, semi-active sontrol strategy

Procedia PDF Downloads 278
162 Intrusion Detection in SCADA Systems

Authors: Leandros A. Maglaras, Jianmin Jiang

Abstract:

The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI). The paradox is that CIs massively rely on the newest interconnected and vulnerable Information and Communication Technology (ICT), whilst the control equipment, legacy software/hardware, is typically old. Such a combination of factors may lead to very dangerous situations, exposing systems to a wide variety of attacks. To overcome such threats, the CockpitCI project combines machine learning techniques with ICT technologies to produce advanced intrusion detection, analysis and reaction tools to provide intelligence to field equipment. This will allow the field equipment to perform local decisions in order to self-identify and self-react to abnormal situations introduced by cyberattacks. In this paper, an intrusion detection module capable of detecting malicious network traffic in a Supervisory Control and Data Acquisition (SCADA) system is presented. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM is an intrusion detection mechanism that does not need any labeled data for training or any information about the kind of anomaly is expecting for the detection process. This feature makes it ideal for processing SCADA environment data and automates SCADA performance monitoring. The OCSVM module developed is trained by network traces off line and detects anomalies in the system real time. The module is part of an IDS (intrusion detection system) developed under CockpitCI project and communicates with the other parts of the system by the exchange of IDMEF messages that carry information about the source of the incident, the time and a classification of the alarm.

Keywords: cyber-security, SCADA systems, OCSVM, intrusion detection

Procedia PDF Downloads 522
161 Effect of Information and Communication Technology (ICT) Usage by Cassava Farmers in Otukpo Local Government Area of Benue State, Nigeria

Authors: O. J. Ajayi, J. H. Tsado, F. Olah

Abstract:

The study analyzed the effect of information and communication technology (ICT) usage on cassava farmers in Otukpo local government area of Benue state, Nigeria. Primary data was collected from 120 randomly selected cassava farmers using multi-stage sampling technique. A structured questionnaire and interview schedule was employed to generate data. Data were analyzed using descriptive (frequency, mean and percentage) and inferential statistics (OLS (ordinary least square) and Chi-square). The result revealed that majority (78.3%) were within the age range of 21-50 years implying that the respondents were within the active age for maximum production. 96.8% of the respondents had one form of formal education or the other. The sources of ICT facilities readily available in area were radio(84.2%), television(64.2%) and mobile phone(90.8%) with the latter being the most relied upon for cassava farming. Most of the farmers were aware (98.3%) and had access (95.8%) to these ICT facilities. The dependence on mobile phone and radio were highly relevant in cassava stem selection, land selection, land preparation, cassava planting technique, fertilizer application and pest and disease management. The value of coefficient of determination (R2) indicated an 89.1% variation in the output of cassava farmers explained by the inputs indicated in the regression model implying that, there is a positive and significant relationship between the inputs and output. The results also indicated that labour, fertilizer and farm size were significant at 1% level of probability while ICT use was significant at 10%. Further findings showed that finance (78.3%) was the major constraint associated with ICT use. Recommendations were made on strengthening the use of ICT especially contemporary ones like the computer and internet among farmers for easy information sourcing which can boost agricultural production, improve livelihood and subsequently food security. This may be achieved by providing credit or subsidies and information centres like telecentres and cyber cafes through government assistance or partnership.

Keywords: ICT, cassava farmers, inputs, output

Procedia PDF Downloads 288
160 Maximization of Lifetime for Wireless Sensor Networks Based on Energy Efficient Clustering Algorithm

Authors: Frodouard Minani

Abstract:

Since last decade, wireless sensor networks (WSNs) have been used in many areas like health care, agriculture, defense, military, disaster hit areas and so on. Wireless Sensor Networks consist of a Base Station (BS) and more number of wireless sensors in order to monitor temperature, pressure, motion in different environment conditions. The key parameter that plays a major role in designing a protocol for Wireless Sensor Networks is energy efficiency which is a scarcest resource of sensor nodes and it determines the lifetime of sensor nodes. Maximizing sensor node’s lifetime is an important issue in the design of applications and protocols for Wireless Sensor Networks. Clustering sensor nodes mechanism is an effective topology control approach for helping to achieve the goal of this research. In this paper, the researcher presents an energy efficiency protocol to prolong the network lifetime based on Energy efficient clustering algorithm. The Low Energy Adaptive Clustering Hierarchy (LEACH) is a routing protocol for clusters which is used to lower the energy consumption and also to improve the lifetime of the Wireless Sensor Networks. Maximizing energy dissipation and network lifetime are important matters in the design of applications and protocols for wireless sensor networks. Proposed system is to maximize the lifetime of the Wireless Sensor Networks by choosing the farthest cluster head (CH) instead of the closest CH and forming the cluster by considering the following parameter metrics such as Node’s density, residual-energy and distance between clusters (inter-cluster distance). In this paper, comparisons between the proposed protocol and comparative protocols in different scenarios have been done and the simulation results showed that the proposed protocol performs well over other comparative protocols in various scenarios.

Keywords: base station, clustering algorithm, energy efficient, sensors, wireless sensor networks

Procedia PDF Downloads 117
159 Humoral and Cellular Immune Responses to Major Human Cytomegalovirus Antigens in Mice Model

Authors: S. Essa, H. Safar, R. Raghupathy

Abstract:

Human cytomegalovirus (CMV) continues to be a source of severe complications to immunologically immature and immune-compromised hosts. Effective CMV vaccine that diminishes CMV disease in transplant patients and avoids congenital infection remains of high importance as no approved vaccines exist. Though the exact links of defense mechanisms are unidentified, viral-specific antibodies and Th1/Th2 cytokine responses have been involved in controlling viral infections. CMV envelope glycoprotein B (UL55/gB), the matrix proteins (UL83/pp65, UL99/pp28, UL32/pp150), and the assembly protein UL80a/pp38 are known to be targets of antiviral immune responses. In this study, mice were immunized with five HCMV antigens (UL32/pp150, UL80a/pp38, UL99/pp28, and UL83/pp65), and serum samples were collected and evaluated for eliciting viral-specific antibody responses. Moreover, Splenocytes were collected, stimulated, and assessed for cytokine responses. The results demonstrated a CMV-antigen-specific antibody response to pp38 and pp65 (E/C >2.0). The highest titers were detected with pp38 (average E/C 16.275) followed by pp65 (average E/C 7.72). Compared to control cells, splenocytes from PP38 antigen immunized mice gave a significantly higher concentration of GM-CSF, IFN-γ, IL-2 IL-4, IL-5, and IL-17A (P<0.05). Also, splenocytes from pp65 antigen immunized mice resulted in a significantly higher concentration of GM-CSF, IFN-γ, IL-2 IL-4, IL-10, IL-12, IL-17A, and TNF- α. The designation of target CMV peptides by identifying viral-specific antibodies and cytokine responses is vital for understanding the protective immune mechanisms during CMV infection and identifying appropriate viral antigens to develop novel vaccines.

Keywords: hepatitis C virus, peripheral blood mononuclear cells, neutrophils, cytokines

Procedia PDF Downloads 110
158 Military Bases and Prostitution: Olongapo City after the Bases

Authors: Karl Gerrard Tiu See

Abstract:

Military bases are an indelible mark of prolonged US defense relationships in the Pacific. Bases like the Subic Naval Base in Olongapo City have irreversible consequences for their host communities, not all of which are positive. One consequence the Subic Naval Base had for Olongapo City was the rise of vibrant sex industry. While the Philippine Senate voted to remove US bases like Subic in 1991, the question remains as to why did prostitution not end after the bases pull-out? To answer this question, the study used an institutionalist lens coupled with focus group discussions from the sex industry. It found that prostitution persisted due to two main reasons. The first was that like Olongapo City; the sex industry successfully shifted its reliance from the military to foreign tourism. The second was that agreements such as the 1996 Visiting Forces Agreement (VFA) ensured that the sex industry continued to receive US military clientele. With the contextual factors as the backdrop, this study used the Theory of Institutional Change to study institutions pivotal in altering Olongapo City and its sex industry after Subic Naval Base. These include local government, civil society actors such as NGOs, and the city’s economic base. The study found that policy such as the VFA allowed the bases period status quo to revive (Symbionts). This led to renewed exploitation from the military presence coupled with foreign tourism (Opportunists). The local government, however, shifted focus away from base reliance which allowed a reinvigorated civil society to effect a gradual change (Subversives). Furthermore, uncertainties like rising HIV incidence, abandoned children born from US soldiers, and the Enhanced Defence Cooperation Agreement (EDCA) remain to change the sex industry’s future, for better or worse.

Keywords: Philippine-USA defence relations, overseas USA basing, 1991 Philippine-USA bases pull-out, Olongapo city, Subic naval base, institutional change

Procedia PDF Downloads 401
157 Enhancing Healthcare Data Protection and Security

Authors: Joseph Udofia, Isaac Olufadewa

Abstract:

Everyday, the size of Electronic Health Records data keeps increasing as new patients visit health practitioner and returning patients fulfil their appointments. As these data grow, so is their susceptibility to cyber-attacks from criminals waiting to exploit this data. In the US, the damages for cyberattacks were estimated at $8 billion (2018), $11.5 billion (2019) and $20 billion (2021). These attacks usually involve the exposure of PII. Health data is considered PII, and its exposure carry significant impact. To this end, an enhancement of Health Policy and Standards in relation to data security, especially among patients and their clinical providers, is critical to ensure ethical practices, confidentiality, and trust in the healthcare system. As Clinical accelerators and applications that contain user data are used, it is expedient to have a review and revamp of policies like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Fast Healthcare Interoperability Resources (FHIR), all aimed to ensure data protection and security in healthcare. FHIR caters for healthcare data interoperability, FHIR caters to healthcare data interoperability, as data is being shared across different systems from customers to health insurance and care providers. The astronomical cost of implementation has deterred players in the space from ensuring compliance, leading to susceptibility to data exfiltration and data loss on the security accuracy of protected health information (PHI). Though HIPAA hones in on the security accuracy of protected health information (PHI) and PCI DSS on the security of payment card data, they intersect with the shared goal of protecting sensitive information in line with industry standards. With advancements in tech and the emergence of new technology, it is necessary to revamp these policies to address the complexity and ambiguity, cost barrier, and ever-increasing threats in cyberspace. Healthcare data in the wrong hands is a recipe for disaster, and we must enhance its protection and security to protect the mental health of the current and future generations.

Keywords: cloud security, healthcare, cybersecurity, policy and standard

Procedia PDF Downloads 59
156 Urbanization and Income Inequality in Thailand

Authors: Acumsiri Tantikarnpanit

Abstract:

This paper aims to examine the relationship between urbanization and income inequality in Thailand during the period 2002–2020. Using a panel of data for 76 provinces collected from Thailand’s National Statistical Office (Labor Force Survey: LFS), as well as geospatial data from the U.S. Air Force Defense Meteorological Satellite Program (DMSP) and the Visible Infrared Imaging Radiometer Suite Day/Night band (VIIRS-DNB) satellite for nineteen selected years. This paper employs two different definitions to identify urban areas: 1) Urban areas defined by Thailand's National Statistical Office (Labor Force Survey: LFS), and 2) Urban areas estimated using nighttime light data from the DMSP and VIIRS-DNB satellite. The second method includes two sub-categories: 2.1) Determining urban areas by calculating nighttime light density with a population density of 300 people per square kilometer, and 2.2) Calculating urban areas based on nighttime light density corresponding to a population density of 1,500 people per square kilometer. The empirical analysis based on Ordinary Least Squares (OLS), fixed effects, and random effects models reveals a consistent U-shaped relationship between income inequality and urbanization. The findings from the econometric analysis demonstrate that urbanization or population density has a significant and negative impact on income inequality. Moreover, the square of urbanization shows a statistically significant positive impact on income inequality. Additionally, there is a negative association between logarithmically transformed income and income inequality. This paper also proposes the inclusion of satellite imagery, geospatial data, and spatial econometric techniques in future studies to conduct quantitative analysis of spatial relationships.

Keywords: income inequality, nighttime light, population density, Thailand, urbanization

Procedia PDF Downloads 55
155 Migration Law in Republic of Panama

Authors: Ronel Solis, Leonardo Collado

Abstract:

Migration law in the Republic of Panama has been regulated mainly by the executive branch. This has created a crisis not only institutional but also social because the evolution of these norms has rested greatly from the discretion of the government in office. This has created instability in immigration regulation and more now, with the migration crisis of which Panama is also part. Different migration policies have been established. The most recent is that of the controlled migration flow, in which, for humanitarian reasons, migrants move from the border with Colombia to the border with Costa Rica. Unfortunately, such control is not enough, and in some cases, unprotected migrants have been confined for months, their passports have been withheld, and no recognition of their rights is offered. The Inter-American Court of Human Rights has condemned Panama for the unfair detention of an irregular migrant, who was detained for two years in Panamanian prisons, without having committed a crime and without accessing a just defense. This is the case Vélez Loor vs. the Republic of Panama. Uncontrollable migration has been putting pressure on Panamanian public health services. The recent denunciation of HIV-related NGOs that warns that there are hundreds of foreigners who receive expensive antiretroviral therapy in Panama is serious, and several of them are irregular migrants. On the other hand, there are no border control posts with the Republic of Colombia, because it is a jungle area and migrants are exposed to arms and drug trafficking, and unfortunately, also to prostitution. Government entities such as the border police service have provided humanitarian support to migrants on the border with Colombia, although it is not their administrative function, and various entities discuss who should address this crisis. However, few economic resources are allocated by the government to solve this problem, especially with the recent mass migration of Venezuelans who have fled their country. The establishment of a migratory normative code is necessary to establish uniformity in the recognition and application of migratory rights. In this way, dependence on the changing migration policies of the different Panamanian governments would be eliminated, and the rights of migrants and nationals would be guaranteed.

Keywords: executive branch, irregular migration, migration code, Republic of Panama

Procedia PDF Downloads 102
154 Feature Engineering Based Detection of Buffer Overflow Vulnerability in Source Code Using Deep Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar

Abstract:

One of the most important challenges in the field of software code audit is the presence of vulnerabilities in software source code. Every year, more and more software flaws are found, either internally in proprietary code or revealed publicly. These flaws are highly likely exploited and lead to system compromise, data leakage, or denial of service. C and C++ open-source code are now available in order to create a largescale, machine-learning system for function-level vulnerability identification. We assembled a sizable dataset of millions of opensource functions that point to potential exploits. We developed an efficient and scalable vulnerability detection method based on deep neural network models that learn features extracted from the source codes. The source code is first converted into a minimal intermediate representation to remove the pointless components and shorten the dependency. Moreover, we keep the semantic and syntactic information using state-of-the-art word embedding algorithms such as glove and fastText. The embedded vectors are subsequently fed into deep learning networks such as LSTM, BilSTM, LSTM-Autoencoder, word2vec, BERT, and GPT-2 to classify the possible vulnerabilities. Furthermore, we proposed a neural network model which can overcome issues associated with traditional neural networks. Evaluation metrics such as f1 score, precision, recall, accuracy, and total execution time have been used to measure the performance. We made a comparative analysis between results derived from features containing a minimal text representation and semantic and syntactic information. We found that all of the deep learning models provide comparatively higher accuracy when we use semantic and syntactic information as the features but require higher execution time as the word embedding the algorithm puts on a bit of complexity to the overall system.

Keywords: cyber security, vulnerability detection, neural networks, feature extraction

Procedia PDF Downloads 63
153 Sea Border Dispute between Greece and Turkey in the Mediterrenean: Implications for Turkey’s Maritime Security and Its Military Spending

Authors: Aslihan Caliskan

Abstract:

The term Mediterranean comes from the Latin “mediterraneus” (Medius, "middle" plus Terra, "land, earth"). For the ancient Romans, the Mediterranean was the center of the earth as they knew it. The desire to gain control of the Mediterranean has led to disputes between many nations throughout history, some of which continue to this day. The recent major natural gas discoveries in the Mediterranean have aggravated ongoing tensions in some neighboring countries. The sea border dispute between Turkey and Greece & Greek-Cypriot side is one of the most critical conflicts in the Mediterranean Sea region. This unresolved dispute has many implications for all countries involved, as well as for third parties that have direct or indirect interests in the region. The research question of this context is what are the implications of this controversial sea border problem on the maritime security of Turkey and its military spending. In this paper, the quantitative method is used. Records from the Turkish Defense Ministry, data from the Turkish naval forces have been obtained. In addition, literature research and the United Nations Convention on the Law of the Sea (UNCLOS) application cases were evaluated, and an incident analysis was carried out. This research shows that the sea border dispute issue has a significant impact on the Turkish military both in terms of the structures required to ensure maritime and border security, as well as rising military costs and its macroeconomic implications. The paper begins with a brief overview of relevant principles and methods applied for delimiting th esea borders. The paper continues with a brief description and a background of the sea border dispute between Turkey and Greece & Greek-Cypriot side in the light of the United Nations Convention on the Law of the Sea (UNCLOS). An analysis of the implications of the dispute on Turkey’s maritime security and its military spending is provided in the following chapters. The paper ends with concluding remarks of the author, including suggestions for the way forward.

Keywords: sea border security, mediterranean sea, greece-turkey dispute, limitation of sea, united nations convention on the law of the sea (UNCLOS)

Procedia PDF Downloads 161
152 Effect of Oxidative Stress on Glutathione Reductase Activity of Escherichia coli Clinical Isolates from Patients with Urinary Tract Infection

Authors: Fariha Akhter Chowdhury, Sabrina Mahboob, Anamika Saha, Afrin Jahan, Mohammad Nurul Islam

Abstract:

Urinary tract infection (UTI) is frequently experienced by the female population where the prevalence increases with aging. Escherichia coli, one of the most common UTI causing organisms, retains glutathione defense mechanism that aids the organism to withstand the harsh physiological environment of urinary tract, host oxidative immune response and even to affect antibiotic-mediated cell death and the emergence of resistance. In this study, we aimed to investigate the glutathione reductase activity of uropathogenic E. coli (UPEC) by observing the reduced glutathione (GSH) level alteration under stressful condition. Urine samples of 58 patients with UTI were collected. Upon isolation and identification, 88% of the samples presented E. coli as UTI causing organism among which randomly selected isolates (n=9), obtained from urine samples of female patients, were considered for this study. E. coli isolates were grown under normal and stressful conditions where H₂O₂ was used as the stress-inducing agent. GSH level estimation of the isolates in both conditions was carried out based on the colorimetric measurement of 5,5'-dithio-bis (2-nitrobenzoic acid) (DTNB) and GSH reaction product using microplate reader assay. The GSH level of isolated E. coli sampled from adult patients decreased under stress compared to normal condition (p = 0.011). On the other hand, GSH production increased markedly in samples that were collected from elderly subjects (p = 0.024). A significant partial correlation between age and change of GSH level was found as well (p = 0.007). This study may help to reveal ways for better understanding of E. coli pathogenesis of UTI prevalence in elderly patients.

Keywords: Escherichia coli, glutathione reductase activity, oxidative stress, reduced glutathione (GSH), urinary tract infection (UTI)

Procedia PDF Downloads 304
151 Role of Obama's Administration Counter-Terrorism Strategies towards Pakistan

Authors: Ahmed Bux Jamali

Abstract:

The purpose of this study is to examine and evaluate the overall counterterrorism cooperation during Obama Administration towards Pakistan. It aims and focuses on the performances and measures taken by United States of America during President Obama in office in order to eradicate terrorism from Pakistan. Being a grave national security threat, terrorism played a disastrous role in the domestic peace and stability of both countries. For the sake of curbing this menace in South Asia in general and Pakistan in particular, the role of Obama Administration is viable and results-oriented despite major ups and downs in Pakistan U.S Relations during that period of time. Obama administration formulated policies when he comes to office in 2009 by looking at the already efforts done by Bush Administration to counterterrorism from Pakistan. Obama’s foreign policy was revolving around defense and diplomacy when it comes to dealing with Pakistan. The concept of smart power was indeed a core principle of Obama’s administration to gain the strategic objectives in Pakistan. Obama’s strategies in terms of providing military aid packages and various assistance programs, working on institutional building and strengthening the economy helped Pakistan in strengthening the military capabilities to go for militant operation in the safe havens area in the tribal areas of Pakistan. It further helped building institutional mechanism in the governmental policies to counter terrorism and militancy. The training of combat forces, artillery, and equipment provided by US proved fatal for the militant terrorist organizations seeking hideouts in the tribal areas of Pakistan. Resultantly, many top leaders of al Qaeda and many affiliated militant groups were captured and given to US as well. Despite many ups and downs in the bilateral relations on various domestic and international issues, both countries didn’t compromise the elimination of terrorist phenomena from Pakistan which was indeed a great success of the Obama administration’s counterterrorism and counterinsurgency strategies in the long run.

Keywords: counterterrorism cooperation, national security strategy, Obama administration, Pakistan-US relations

Procedia PDF Downloads 157
150 Phytoremediation of Textile Wastewater Laden with 1,4-Dioxane Using Eichhornia crassipes: A Sustainable Development Approach

Authors: Hadeer Ibrahiem, Mahmoud Nasr, Masarrat M. M. Migahid, Mohamed A. Ghazy

Abstract:

The release of textile wastewater loaded with 1,4 dioxane into aquatic ecosystems has been associated with various human health risks and adverse environmental impacts. In parallel, phytoremediation has been recently employed to treat highly polluted wastewater because various plant species tend to produce certain enzymes as a defense mechanism against a toxic environment. To our best knowledge, this study is the first to investigate the ability of phytoremediation using Eichhornia crassipes for the removal of various pollutants, including 1,4 dioxane, from textile wastewater. A phytoremediation system composed of Eichhornia crassipes was acclimatized for 10 d, and then operated in four lab-scale hydroponic systems, viz., negative control, positive control, and two different 1,4 dioxane concentration (400 and 500 mg/L). After 11 d of operation, the phytoremediation system achieved removal efficiencies of 67.5±3.4%, 89.4±4.4%, 83.6±3.8% for 1,4 dioxane (at initial concentration 400 mg/L), chemical oxygen demand (COD) (at initial concentration 679 mg/L), and cumulative heavy metals, respectively. The removal of these pollutants was mainly supported by the phyto-sorption and phytodegradation mechanisms. The economic feasibility of this phytoremediation system was validated by estimating the capital and operating costs, requiring 4.6 USD for the treatment of 1 m3 textile wastewater. The study concluded that the phytoremediation process could be used as a practical and economical approach to treat textile wastewater laden with various organic and inorganic pollutants. Due to the observed pollution reduction and human health protection, the study objectives would fulfill the targets of SDG 3 “Good Health and Well-being” and SDG 6 “Clean Water and Sanitation”. Further studies are required to (i) investigate the ability of plant species to withstand higher concentrations of 1,4 dioxane for an extended operation time and (ii) understand the biochemical pathways for the degradation of 1,4 dioxane via the action of plant enzymes and the associated microbial community.

Keywords: 1, 4 dioxane concentrations, hydrophytes, Eichhornia crassipes, phytoremediation effectiveness, SDGs, textile industrial effluent

Procedia PDF Downloads 79
149 Investigating the Potential Use of Unsaturated Fatty Acids as Antifungal Crop Protective Agents

Authors: Azadeh Yasari, Michael Ganzle, Stephen Strelkov, Nuanyi Liang, Jonathan Curtis, Nat N. V. Kav

Abstract:

Pathogenic fungi cause significant yield losses and quality reductions to major crops including wheat, canola, and barley. Toxic metabolites produced by phytopathogenic fungi also pose significant risks to animal and human health. Extensive application of synthetic fungicides is not a sustainable solution since it poses risks to human, animal and environmental health. Unsaturated fatty acids may provide an environmentally friendly alternative because of their direct antifungal activity against phytopathogens as well as through the stimulation of plant defense pathways. The present study assessed the in vitro and in vivo efficacy of two hydroxy fatty acids, coriolic acid and ricinoleic acid, against the phytopathogens Fusarium graminearum, Pyrenophora tritici-repentis, Pyrenophora teres f. teres, Sclerotinia sclerotiorum, and Leptosphaeria maculans. Antifungal activity of coriolic acid and ricinoleic acid was evaluated using broth micro-dilution method to determine the minimum inhibitory concentration (MIC). Results indicated that both ricinoleic acid and coriolic acid showed antifungal activity against phytopathogens, with the strongest inhibitory activity against L. maculans, but the MIC varied greatly between species. An antifungal effect was observed for coriolic acid in vivo against pathogenic fungi of wheat and barley. This effect was not correlated to the in vitro activity because ricinoleic acid with equivalent in vitro antifungal activity showed no protective effect in vivo. Moreover, neither coriolic acid nor ricinoleic acid controlled fungal pathogens of canola. In conclusion, coriolic acid inhibits some phytopathogens in vivo and may have the potential to be an effective crop protection agent.

Keywords: coriolic acid, minimum inhibitory concentration, pathogenic fungi, ricinoleic acid

Procedia PDF Downloads 151
148 Implication of Oxidative Stress and Intracellular Mediators in the Protective Effect of Artemisia campestris against Aspirin-Induced Gastric Lesions in Rat Model

Authors: Hichem Sebai, Mohamed Amine Jabri, Kais Rtibi, Haifa Tounsi, Lamjed Marzouki

Abstract:

Artemisia campestris has been widely used in Tunisian traditional medicine for its health beneficial effects. However, the present study aims at evaluating the antiulcer effects of Artemisia campestris aqueous extract (ACAE) as well as the mechanism of action involved in such gastroprotection. In this respect, male Wistar rats were divided into seven groups: control, aspirin (ASPR), ASPR + various doses of ACAE (100, 200 and 400 mg/kg, b.w.), ASPR+ famotidine and ASPR+ caffeic acid. Animals were pre-treated with ACAE extract during 10 days. We firstly showed that aspirin administration was accompanied by an oxidative stress status assessed by an increase of malondialdehyde (MDA) level, a decrease of sulfhydryl -(SH) groups content and depletion of antioxidant enzyme activities such as superoxide dismutase (SOD), catalase (CAT) and glutathione peroxidase (GPx). Pre-treatment with ACAE protected against aspirin-induced gastric oxidative stress. More importantly, aspirin administration increased plasma and tissue hydrogen peroxide (H₂O₂), free iron and calcium levels while the ACAE pre-treatment reversed all aspirin-induced intracellular mediators disturbance. The results of the present study clearly indicated that AEAC gastroprotection might be related, at least in part, to its antioxidant properties as well as to various gastric mucosal defense mechanisms, including the protection of gastric sulfhydryls and an opposite effect on some intracellular mediators such as free iron, hydrogen peroxide, and calcium. However, our data confirm the use of Artemisia campestris extracts in the Tunisian traditional folk medicine for the treatment of gastrointestinal diseases.

Keywords: gastric ulcer, Artemisia campestris, oxidative stress, sulfhydryl groups, Fenton reaction, rat

Procedia PDF Downloads 124
147 E-Government Development in Nigeria, 'Bank Verification No': An Anti-Corruption Tool

Authors: Ernest C. Nwadinobi, Amanda Peart, Carl Adams

Abstract:

The leading countries like the USA, UK and some of the European countries have moved their focus away from just developing the e-government platform towards just the electronic services which aim at providing access to information to its citizens or customers, but they have gone to make significant backroom changes that can accommodate this electronic service being provided to its customers or citizens. E-government has moved from just providing electronic information to citizens and customers alike to serving their needs. In developing countries like Nigeria, the enablement of e-government is being used as an anti-corruption tool. The introduction of the Bank verification number (BVN) scheme by the Central Bank of Nigeria, has helped the government in not just saving money but also protecting customer’s transaction and enhancing confidence in the banking sector. This has helped curtail the high rate of cyber and financial crime that has been part of the system. The use of BVN as an anti-corruption tool in Nigeria came at a time there was need for openness, accountability, and discipline, after years of robbing the treasury and recklessness in handling finances. As there has not been a defined method for measuring the strength or success of e-government development, in this case BVN, in Nigeria, progress will remain at the same level. The implementation strategy of the BVN in Nigeria has mostly been a quick fix, quick win solution. In fact, there is little or no indication to show evidence of a framework for e-government. Like other leading countries, there is the need for proper implementation of strategy and framework especially towards a customer orientated process, which will accommodate every administrative body of the government institution including private business rather than focusing on a non-flexible organisational structure. The development of e-government must have a strategy and framework for it to work, and this strategy must enclose every public administration and will not be limited to any individual bodies or organization. A defined framework or monitoring method must be put in place to help evaluate and benchmark government development in e-government. This framework must follow the same concept or principles. In censorious analyses of the existing methods, this paper will denote areas that must be included in the existing approach to be able to channel e-government development towards its defined strategic objectives.

Keywords: Bank Verification No (BVN), quick-fix, anti-corruption, quick-win

Procedia PDF Downloads 141
146 The Effect of General Data Protection Regulation on South Asian Data Protection Laws

Authors: Sumedha Ganjoo, Santosh Goswami

Abstract:

The rising reliance on technology places national security at the forefront of 21st-century issues. It complicates the efforts of emerging and developed countries to combat cyber threats and increases the inherent risk factors connected with technology. The inability to preserve data securely might have devastating repercussions on a massive scale. Consequently, it is vital to establish national, regional, and global data protection rules and regulations that penalise individuals who participate in immoral technology usage and exploit the inherent vulnerabilities of technology. This study paper seeks to analyse GDPR-inspired Bills in the South Asian Region and determine their suitability for the development of a worldwide data protection framework, considering that Asian countries are much more diversified than European ones. In light of this context, the objectives of this paper are to identify GDPR-inspired Bills in the South Asian Region, identify their similarities and differences, as well as the obstacles to developing a regional-level data protection mechanism, thereby satisfying the need to develop a global-level mechanism. Due to the qualitative character of this study, the researcher did a comprehensive literature review of prior research papers, journal articles, survey reports, and government publications on the aforementioned topics. Taking into consideration the survey results, the researcher conducted a critical analysis of the significant parameters highlighted in the literature study. Many nations in the South Asian area are in the process of revising their present data protection measures in accordance with GDPR, according to the primary results of this study. Consideration is given to the data protection laws of Thailand, Malaysia, China, and Japan. Significant parallels and differences in comparison to GDPR have been discussed in detail. The conclusion of the research analyses the development of various data protection legislation regimes in South Asia.

Keywords: data privacy, GDPR, Asia, data protection laws

Procedia PDF Downloads 61
145 Environmental Problems (with Examples from Georgia)

Authors: Ana Asratashvili

Abstract:

One of the main issues of state’s economic policy is the environmental problems. The development of society is implementing by the connection with nature. A human being needs different material resources which must be got by the influence on the nature. This relationship between nature and society is complicated and controversial and it was changing from time to time according to human’s evolution. The imprudent and unreasonable usage of natural resources, scientific-technological revolution and the hard pollution of nature related to it caused the disruption of environmental balance between nature and society which has been made for ages and destructively acted on society and environment. Environmental protection is one of the major issues of the European Union all over the world. The aim of EU environmental policy is to improve ecological conditions. Besides, it aims encouraging of careful and rational usage of natural resources. At the same time, the union tries to raise problems related to environmental protection at the international level. After that when scientists concluded anthropogenic impact of human on the nature causes climate changes, the special attention was paid to the environmental protection by developed countries. Global warming will cause floods, storms, draughts and desertification and to solve these results presumably will cost 20% of World GDP by 2050 for developed countries, if, of course, it does not make strict environmental policy. EU member countries have pretty strict environmental standards. Their defense is observed by different state institutions. According to impacts on nature throughout the world the most polluted fumes are made by electricity facilities (44%), transport (20%), industry (18%), domestic and service sector (17%). The special concern to the issues related to the importance of environment by environmentalists is caused by low self-esteem of population about the problems of environment. According to their mind, population is engaged with daily difficulties so that they don’t react much on environmental problems. Correspondingly, the main task for environmental organizations is to inform population and raise self-esteem about environmental issues.

Keywords: economic policy, environment, technological revolution, pollution, environmental, standards, self-esteem

Procedia PDF Downloads 274