Search results for: threats identification
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3517

Search results for: threats identification

2977 [Keynote Talk]: Green Supply Chain Management Concepts Applied on Brazilian Animal Nutrition Industries

Authors: Laura G. Caixeta, Maico R. Severino

Abstract:

One of the biggest challenges that the industries find nowadays is to incorporate sustainability practices into its operations. The Green Supply Chain Management (GSCM) concept assists industries in such incorporation. For the full application of this concept is important that enterprises of a same supply chain have the GSCM practices coordinated among themselves. Note that this type of analyses occurs on the context of developed countries and sectors considered big impactors (as automotive, mineral, among others). The propose of this paper is to analyze as the GSCM concepts are applied on the Brazilian animal nutrition industries. The method used was the Case Study. For this, it was selected a supply chain relationship composed by animal nutrition products manufacturer (Enterprise A) and its supplier of animal waste, such as blood, viscera, among others (Enterprise B). First, a literature review was carried out to identify the main GSCM practices. Second, it was done an individual analysis of each one selected enterprise of the application of GSCM concept. For the observed practices, the coordination of each practice in this supply chain was studied. And, it was developed propose of GSCM applications for the practices no observed. The findings of this research were: a) the systematization of main GSCM practices, as: Internal Environment Management, Green Consumption, Green Design, Green Manufacturing, Green Marketing, Green Packaging, Green Procurement, Green Recycling, Life Cycle Analysis, Consultation Selection Method, Environmental Risk Sharing, Investment Recovery, and Reduced Transportation Time; b) the identification of GSCM practices on Enterprise A (7 full application, 3 partial application and 3 no application); c) the identification of GSCM practices on Enterprise B (2 full application, 2 partial application and 9 no application); d) the identification of how is the incentive and the coordination of the GSCM practices on this relationship by Enterprise A; e) proposals of application and coordination of the others GSCM practices on this supply chain relationship. Based on the study, it can be concluded that its possible apply GSCM on animal nutrition industries, and when occurs the motivation on the application of GSCM concepts by a supply chain echelon, these concepts are deployed for the others supply chain echelons by the coordination (orchestration) of the first echelon.

Keywords: animal nutrition industries, coordination, green supply chain management, supply chain management, sustainability

Procedia PDF Downloads 114
2976 Carbon Sequestration in Spatio-Temporal Vegetation Dynamics

Authors: Nothando Gwazani, K. R. Marembo

Abstract:

An increase in the atmospheric concentration of carbon dioxide (CO₂) from fossil fuel and land use change necessitates identification of strategies for mitigating threats associated with global warming. Oceans are insufficient to offset the accelerating rate of carbon emission. However, the challenges of oceans as a source of reducing carbon footprint can be effectively overcome by the storage of carbon in terrestrial carbon sinks. The gases with special optical properties that are responsible for climate warming include carbon dioxide (CO₂), water vapors, methane (CH₄), nitrous oxide (N₂O), nitrogen oxides (NOₓ), stratospheric ozone (O₃), carbon monoxide (CO) and chlorofluorocarbons (CFC’s). Amongst these, CO₂ plays a crucial role as it contributes to 50% of the total greenhouse effect and has been linked to climate change. Because plants act as carbon sinks, interest in terrestrial carbon sequestration has increased in an effort to explore opportunities for climate change mitigation. Removal of carbon from the atmosphere is a topical issue that addresses one important aspect of an overall strategy for carbon management namely to help mitigate the increasing emissions of CO₂. Thus, terrestrial ecosystems have gained importance for their potential to sequester carbon and reduce carbon sink in oceans, which have a substantial impact on the ocean species. Field data and electromagnetic spectrum bands were analyzed using ArcGIS 10.2, QGIS 2.8 and ERDAS IMAGINE 2015 to examine the vegetation distribution. Satellite remote sensing data coupled with Normalized Difference Vegetation Index (NDVI) was employed to assess future potential changes in vegetation distributions in Eastern Cape Province of South Africa. The observed 5-year interval analysis examines the amount of carbon absorbed using vegetation distribution. In 2015, the numerical results showed low vegetation distribution, therefore increased the acidity of the oceans and gravely affected fish species and corals. The outcomes suggest that the study area could be effectively utilized for carbon sequestration so as to mitigate ocean acidification. The vegetation changes measured through this investigation suggest an environmental shift and reduced vegetation carbon sink, and that threatens biodiversity and ecosystem. In order to sustain the amount of carbon in the terrestrial ecosystems, the identified ecological factors should be enhanced through the application of good land and forest management practices. This will increase the carbon stock of terrestrial ecosystems thereby reducing direct loss to the atmosphere.

Keywords: remote sensing, vegetation dynamics, carbon sequestration, terrestrial carbon sink

Procedia PDF Downloads 135
2975 Ultrasound/Microwave Assisted Extraction Recovery and Identification of Bioactive Compounds (Polyphenols) from Tarbush (Fluorensia cernua)

Authors: Marisol Rodriguez-Duarte, Aide Saenz-Galindo, Carolina Flores-Gallegos, Raul Rodriguez-Herrera, Juan Ascacio-Valdes

Abstract:

The plant known as tarbush (Fluorensia cernua) is a plant originating in northern Mexico, mainly in the states of Coahuila, Durango, San Luis Potosí, Zacatecas and Chihuahua. It is a branched shrub that belongs to the family Asteraceae, has oval leaves of 6 to 11 cm in length and also has small yellow flowers. In Mexico, the tarbush is a very appreciated plant because it has been used as a traditional medicinal agent, for the treatment of gastrointestinal diseases, skin infections and as a healing agent. This plant has been used mainly as an infusion. Due to its traditional use, the content and type of phytochemicals present in the plant are currently unknown and are responsible for its biological properties, so its recovery and identification is very important because the compounds that it contains have relevant applications in the field of food, pharmaceuticals and medicine. The objective of this work was to determine the best extraction condition of phytochemical compounds (mainly polyphenolic compounds) from the leaf using ultrasound/microwave assisted extraction (U/M-AE). To reach the objective, U/M-AE extractions were performed evaluating three mass/volume ratios (1:8, 1:12, 1:16), three ethanol/water solvent concentrations (0%, 30% and 70%), ultrasound extraction time of 20 min and 5 min at 70°C of microwave treatment. All experiments were performed using a fractional factorial experimental design. Once the best extraction condition was defined, the compounds were recovered by liquid column chromatography using Amberlite XAD-16, the polyphenolic fraction was recovered with ethanol and then evaporated. The recovered polyphenolic compounds were quantified by spectrophotometric techniques and identified by HPLC/ESI/MS. The results obtained showed that the best extraction condition of the compounds was using a mass/volume ratio of 1:8 and solvent ethanol/water concentration of 70%. The concentration obtained from polyphenolic compounds using this condition was 22.74 mg/g and finally, 16 compounds of polyphenolic origin were identified. The results obtained in this work allow us to postulate the Mexican plant known as tarbush as a relevant source of bioactive polyphenolic compounds of food, pharmaceutical and medicinal interest.

Keywords: U/M-AE, tarbush, polyphenols, identification

Procedia PDF Downloads 143
2974 Examining the Extent and Magnitude of Food Security amongst Rural Farming Households in Nigeria

Authors: Ajibade T., Omotesho O. A., Ayinde O. E, Ajibade E. T., Muhammad-Lawal A.

Abstract:

This study was carried out to examine the extent and magnitude of food security amongst farming rural households in Nigeria. Data used for this study was collected from a total of two hundred and forty rural farming households using a two-stage random sampling technique. The main tools of analysis for this study include descriptive statistics and a constructed food security index using the identification and aggregation procedure. The headcount ratio in this study reveals that 71% of individuals in the study area were food secure with an average per capita calorie and protein availability of 4,213.92kcal and 99.98g respectively. The aggregated household daily calorie availability and daily protein availability per capita were 3,634.57kcal and 84.08g respectively which happens to be above the food security line of 2,470kcal and 65g used in this study. The food insecure households fell short of the minimum daily per capita calorie and protein requirement by 2.1% and 24.9%. The study revealed that the area is food insecure due to unequal distribution of the available food amongst the sampled population. The study recommends that the households should empower themselves financially in order to enhance their ability to afford the food during both on and off seasons. Also, processing and storage of farm produce should be enhanced in order to improve on availability throughout the year.

Keywords: farming household, food security, identification and aggregation, food security index

Procedia PDF Downloads 268
2973 Isolation and Molecular Identification of Phenol Tolerating Bacteria from Petroleum Contaminated Sites

Authors: S. M. Dankaka, N. Abdullahi

Abstract:

Context: This research was conducted to isolate and identify phenol-tolerant bacteria from petroleum-contaminated sites in the northwestern part of Nigeria. Research Aim: The aim of this study was to identify bacteria with the ability to tolerate different phenol concentrations. Methodology: Samples were obtained from different petroleum-contaminated sites, and bacteria were cultured, followed by morphological, microscopic, and molecular identification. Isolates were grown on phenol-tolerant nutrient agar. The tolerant ability of the isolates was observed at 500 mg/L, 1000 mg/L, and 1500 mg/L concentrations of phenol. Findings: Two bacteria species (NWPK and NWPKD) were obtained. The total viable counts of phenol-utilizing bacteria from NWPK and NWPKD were 2.71x10⁷ and 4.0x10⁶ cfu/g, respectively. The NWPK showed its capacity to tolerate phenol at 2.3x10⁷, 2.5x10⁷, and 1.0x10⁷ cfu/g of 500, 1000, and 1500 mg/L of phenol concentration, respectively, while NWPKD tolerance ability was 1.5x10⁷, 3.8x10⁷ and 1.0x10⁷ cfu/g of 500, 1000 and 1500 mg/L of phenol respectively. The isolates were identified as Citrobacter and Acinetobacter species, respectively, based on 16S rRNA gene sequence analysis. Conclusion: The study found that these isolates showed the ability to withstand and survive high phenol concentrations in the environment.

Keywords: phenol tolerance, bacteria, petroleum contaminated sites, 16S rRNA

Procedia PDF Downloads 71
2972 Navigating Cyber Attacks with Quantum Computing: Leveraging Vulnerabilities and Forensics for Advanced Penetration Testing in Cybersecurity

Authors: Sayor Ajfar Aaron, Ashif Newaz, Sajjat Hossain Abir, Mushfiqur Rahman

Abstract:

This paper examines the transformative potential of quantum computing in the field of cybersecurity, with a focus on advanced penetration testing and forensics. It explores how quantum technologies can be leveraged to identify and exploit vulnerabilities more efficiently than traditional methods and how they can enhance the forensic analysis of cyber-attacks. Through theoretical analysis and practical simulations, this study highlights the enhanced capabilities of quantum algorithms in detecting and responding to sophisticated cyber threats, providing a pathway for developing more resilient cybersecurity infrastructures.

Keywords: cybersecurity, cyber forensics, penetration testing, quantum computing

Procedia PDF Downloads 27
2971 The Application of Insects in Forensic Investigations

Authors: Shirin Jalili, Hadi Shirzad, Samaneh Nabavi, Somayeh Khanjani

Abstract:

Forensic entomology is the science of study and analysis of insects evidences to aid in criminal investigation. Being aware of the distribution, biology, ecology and behavior of insects, which are founded at crime scene can provide information about when, where and how the crime has been committed. It has many application in criminal investigations. Its main use is estimation of the minimum time after death in suspicious death. The close association between insects and corpses and the use of insects in criminal investigations is the subject of forensic entomology. Because insects attack to the decomposing corpse and spawning on it from the initial stages. Forensic scientists can estimate the postmortem index by studying the insects population and the developing larval stages.In addition, toxicological and molecular studies of these insects can reveal the cause of death or even the identity of a victim. It also be used to detect drugs and poisons, and determination of incident location. Gathering robust entomological evidences is made possible for experts by recent Techniques. They can provide vital information about death, corpse movement or burial, submersion interval, time of decapitation, identification of specific sites of trauma, post-mortem artefacts on the body, use of drugs, linking a suspect to the scene of a crime, sexual molestations and the identification of suspects.

Keywords: Forensic entomology, post mortem interval, insects, larvae

Procedia PDF Downloads 486
2970 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels

Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur

Abstract:

With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.

Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography

Procedia PDF Downloads 101
2969 Oral Microflora and the Risk of Dental Caries in Portuguese Children

Authors: Sara Sousa, Veronique Gomes, Nélio Veiga, Maria José Correia

Abstract:

Objectives: To assess the presence or absence of Streptococcus mutans, Streptococcus gordonii and Streptococcus salivarius in the oral biofilm of children in an elementary school of Viseu, Portugal, and verify the relationship between Streptococcus gordonii and Streptococcus salivarius and the absence of dental caries. Methods: A cross-sectional study was designed with a final sample of 40 children aged 6-11 years old. Oral examination was accomplished with the identification of their oral health status and oral biofilm collection. Analysis of biological samples by molecular techniques of DNA isolation and identification of three Streptococci bacteria by Polimerase Chain Reaction (PCR) was made. Results: We identified Streptococcus salivarius and Streptococcus gordoni only in the lower interincisal region. These species were also present mainly in the first permanent non-decayed molars. On the contrary, Streptococcus mutans was found mostly in decayed first permanent molars. Conclusion: This preliminary study establishes a possible association between the absence of dental caries and the presence of Streptococcus gordonii and Streptococcus salivarius. Since these two species are described as alkali producers, it is suggested that their presence somehow confers protection against caries. These results support new dental caries prevention strategies based on oral biofilm modulation by enrichment with alkalinogenic species.

Keywords: dental caries, oral biofilm, Streptococcus gordonii, Streptococcus salivarius

Procedia PDF Downloads 265
2968 Computational Analyses of Persian Walnut Genetic Data: Notes on Genetic Diversity and Cultivar Phylogeny

Authors: Masoud Sheidaei, Melica Tabasi, Fahimeh Koohdar, Mona Sheidaei

Abstract:

Juglans regia L. is an economically important species of edible nuts. Iran is known as a center of origin of genetically rich walnut germplasm and expected to be found a large diversity within Iranian walnut populations. A detailed population genetic of local populations is useful for developing an optimal strategy for in situ conservation and can assist the breeders in crop improvement programs. Different phylogenetic studies have been carried out in this genus, but none has been concerned with genetic changes associated with geographical divergence and the identification of adaptive SNPs. Therefore, we carried out the present study to identify discriminating ITS nucleotides among Juglans species and also reveal association between ITS SNPs and geographical variables. We used different computations approaches like DAPC, CCA, and RDA analyses for the above-mentioned tasks. We also performed population genetics analyses for population effective size changes associated with the species expansion. The results obtained suggest that latitudinal distribution has a more profound effect on the species genetic changes. Similarly, multiple analytical approaches utilized for the identification of both discriminating DNA nucleotides/ SNPs almost produced congruent results. The SNPs with different phylogenetic importance were also identified by using a parsimony approach.

Keywords: Persian walnut, adaptive SNPs, data analyses, genetic diversity

Procedia PDF Downloads 109
2967 Experiences and Aspirations of Hearing Impaired Learners in Inclusive Classrooms

Authors: Raymon P. Española

Abstract:

Hearing impaired students are admitted to regular high schools in the context of inclusive education. In this setting, several academic difficulties and social struggles are disregarded by many educators. The study aimed to describe the aspirations and lived experiences in mainstream classrooms of hearing impaired students. In the research process, the participants were interviewed using sign language. Thematic analysis of interview responses was done, supplemented by interviews with teachers and classroom observations. The study revealed four patterns of experiences: academic difficulties, coping mechanisms, identification with hearing peers, and impression management. This means that these learners were struggling in inclusive classrooms, where identification with and modeling the positive qualities of hearing peers were done to cope with academic difficulties and alter negative impressions about them. By implication, these learners tended to socially immerse themselves rather than resort to isolation. Along with this tendency was the aspiration for achievement as they were eager to finish post-secondary technical-vocational education. This means aspiring for continuing social immersion into the mainstream. All these findings provide insights to K-12 educators to increase the use of collaborative techniques and experiential learning strategies, as well as to adequately address the special educational needs of these students.

Keywords: descriptive, experiences and aspirations of hearing impaired learners, inclusive classrooms, Surigao City Philippines

Procedia PDF Downloads 395
2966 The Impact of Quality Management System Establishment over the Performance of Public Administration Services in Kosovo

Authors: Ilir Rexhepi, Naim Ismajli

Abstract:

Quality and quality management are key factors of success nowadays. Public sector and quality management in this sector contains many challenges and difficulties, most notably in a new country like Kosovo. This study analyses the process of implementation of quality management system in public administration institutions in this country. The main objective is to show how to set up a quality management system and how does the quality management system setup affect the overall public administration services in Kosovo. This study shows how the efficiency and effectiveness of public institution services/performance is rapidly improving through the establishment and functionalization of Quality Management System. The specific impact of established QMC within the organization has resulted with the identification of mission related processes within the entire system including input identification, the person in charge and the way of conversion to the output of each activity though the interference with other service processes within the system. By giving detailed analyses of all steps of implementation of the Quality Management System, its effect and consequences towards the overall public institution service performance, we try to go one step further, by showing it as a very good example or tool of other public institutions for improving their service performance. Interviews with employees, middle and high level managers including the quality manager and general secretaries are also part of analyses in this paper.

Keywords: quality, quality management system, efficiency, public administration institutions

Procedia PDF Downloads 258
2965 Data Science Inquiry to Manage Football Referees’ Careers

Authors: Iñaki Aliende, Tom Webb, Lorenzo Escot

Abstract:

There is a concern about the decrease in football referees globally. A study in Spain has analyzed the factors affecting a referee's career over the past 30 years through a survey of 758 referees. Results showed the impact of factors such as threats, education, initial vocation, and dependents on a referee's career. To improve the situation, the federation needs to provide better information, support young referees, monitor referees, and raise public awareness of violence toward referees. The study also formed a comprehensive model for federations to enhance their officiating policies by means of data-driven techniques that can serve other federations to improve referees' careers.

Keywords: data science, football referees, sport management, sport careers, survival analysis

Procedia PDF Downloads 75
2964 Gene Prediction in DNA Sequences Using an Ensemble Algorithm Based on Goertzel Algorithm and Anti-Notch Filter

Authors: Hamidreza Saberkari, Mousa Shamsi, Hossein Ahmadi, Saeed Vaali, , MohammadHossein Sedaaghi

Abstract:

In the recent years, using signal processing tools for accurate identification of the protein coding regions has become a challenge in bioinformatics. Most of the genomic signal processing methods is based on the period-3 characteristics of the nucleoids in DNA strands and consequently, spectral analysis is applied to the numerical sequences of DNA to find the location of periodical components. In this paper, a novel ensemble algorithm for gene selection in DNA sequences has been presented which is based on the combination of Goertzel algorithm and anti-notch filter (ANF). The proposed algorithm has many advantages when compared to other conventional methods. Firstly, it leads to identify the coding protein regions more accurate due to using the Goertzel algorithm which is tuned at the desired frequency. Secondly, faster detection time is achieved. The proposed algorithm is applied on several genes, including genes available in databases BG570 and HMR195 and their results are compared to other methods based on the nucleotide level evaluation criteria. Implementation results show the excellent performance of the proposed algorithm in identifying protein coding regions, specifically in identification of small-scale gene areas.

Keywords: protein coding regions, period-3, anti-notch filter, Goertzel algorithm

Procedia PDF Downloads 375
2963 Active Cyber Defense within the Concept of NATO’s Protection of Critical Infrastructures

Authors: Serkan Yağlı, Selçuk Dal

Abstract:

Cyber-attacks pose a serious threat to all states. Therefore, states constantly seek for various methods to encounter those threats. In addition, recent changes in the nature of cyber-attacks and their more complicated methods have created a new concept: active cyber defence (ACD). This article tries to answer firstly why ACD is important to NATO and find out the viewpoint of NATO towards ACD. Secondly, infrastructure protection is essential to cyber defence. Critical infrastructure protection with ACD means is even more important. It is assumed that by implementing active cyber defence, NATO may not only be able to repel the attacks but also be deterrent. Hence, the use of ACD has a direct positive effect in all international organizations’ future including NATO.

Keywords: active cyber defence, advanced persistent treat, critical infrastructure, NATO

Procedia PDF Downloads 229
2962 Palyno-Morphological Characteristics of Gymnosperm Flora of Pakistan and Its Taxonomic Implications with Light Microscope and Scanning Electron Microscopy Methods

Authors: Raees Khan, Sheikh Z. Ul Abidin, Abdul S. Mumtaz, Jie Liu

Abstract:

The present study is intended to assess gymnosperms pollen flora of Pakistan using Light Microscope (LM) and Scanning Electron Microscopy (SEM) for its taxonomic significance in identification of gymnosperms. Pollens of 35 gymnosperm species (12 genera and five families) were collected from its various distributional sites of gymnosperms in Pakistan. LM and SEM were used to investigate different palyno-morphological characteristics. Five pollen types (i.e., Inaperturate, Monolete, Monoporate, Vesiculate-bisaccate, and Polyplicate) were observed. In equatorial view seven types of pollens were observed, in which ten species were sub-angular, nine species were triangular, six species were perprolate, three species were rhomboidal, three species were semi-angular, two species were rectangular and two species were prolate. While five types of pollen were observed in polar view, in which ten species were spheroidal, nine species were angular, eight were interlobate, six species were circular, and two species were elliptic. Eighteen species have rugulate and 17 species has faveolate ornamentation. Eighteen species have verrucate and 17 have gemmate type sculpturing. The data was analysed through cluster analysis. The study showed that these palyno-morphological features have significance value in classification and identification of gymnosperms. Based on these different palyno-morphological features, a taxonomic key was proposed for the accurate and fast identifications of gymnosperms from Pakistan.

Keywords: gymnosperms, palynology, Pakistan, taxonomy

Procedia PDF Downloads 199
2961 Hidden Critical Risk in the Construction Industry’s Technological Adoption: Cybercrime

Authors: Nuruddeen Usman, Usman Mohammed Gidado, Muhammad Ahmad Ibrahim

Abstract:

Construction industry is one of the sectors that are eyeing adoption of ICT for its development due to the advancement in technology. Though, many manufacturing sectors had been using it, but construction industry was left behind, especially in the developing nation like Nigeria. On account of that, the objective of this study is to conceptually and quantitatively synthesise whether the slow adoption of ICT by the construction industries can be attributable to cybercrime threats. The result of the investigation found that, the risk of cybercrime, and lack of adequate cyber security policies that can enforce and punish defaulters are among the things that hinder ICT adoption of the Nigerian construction industries. Therefore, there is need for the nations to educate their citizens on cybercrime risk, and to establish cybercrime police units that can be monitoring and controlling all online communications.

Keywords: construction industry, cybercrime, information and communication technology adoption, risk

Procedia PDF Downloads 488
2960 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems

Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia

Abstract:

The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.

Keywords: cloud computing, data management, multi-tenancy, requirements, security

Procedia PDF Downloads 137
2959 Effect of Waste Dumping on Groundwater Quality at Guntun Layi Funtua, Katsina State

Authors: Isiya Aminu Dabai, Adebola Kayode, Adeosun Kayode Daniel

Abstract:

Rural water supply relies mainly on groundwater exploitation, because it is more accessible, reliable, cheaper to develop and maintain, also with good quality compared to the surface water. Despite these advantages, groundwater has come under pollution threats like waste dumps, mineral exploitation, industrialization etc. This study investigates the effects of an open dumping to the surrounding groundwater. Ten hand dug well water samples were collected from the surroundings and tested. The average result shows that temperature, colour and turbidity to be 8.50 c, 6.1 TCU and 3.1 NTU respectively and pH, conductivity, total dissolved solids, chloride content and hardness to be 7.2, 4.78, 1.8, 5.7, and 3.4 respectively while in the bacteriological test well no. 1, 2, 3, and 5 shows the presence of coliforms and E. Coli bacteria.

Keywords: groundwater, pollution, waste, dump site, unsafe, quality

Procedia PDF Downloads 664
2958 Scientific Forecasting in International Relations

Authors: Djehich Mohamed Yousri

Abstract:

In this research paper, the future of international relations is believed to have an important place on the theoretical and applied levels because policy makers in the world are in dire need of such analyzes that are useful in drawing up the foreign policies of their countries, and protecting their national security from potential future threats, and in this context, The topic raised a lot of scientific controversy and intellectual debate, especially in terms of the extent of the effectiveness, accuracy, and ability of foresight methods to identify potential futures, and this is what attributed the controversy to the scientific foundations for foreseeing international relations. An arena for intellectual discussion between different thinkers in international relations belonging to different theoretical schools, which confirms to us the conceptual and implied development of prediction in order to reach the scientific level.

Keywords: foresight, forecasting, international relations, international relations theory, concept of international relations

Procedia PDF Downloads 194
2957 Secure Content Centric Network

Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris

Abstract:

Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.

Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer

Procedia PDF Downloads 627
2956 Possible Risks for Online Orders in the Furniture Industry - Customer and Entrepreneur Perspective

Authors: Justyna Żywiołek, Marek Matulewski

Abstract:

Data, is information processed by enterprises for primary and secondary purposes as processes. Thanks to processing, the sales process takes place; in the case of the surveyed companies, sales take place online. However, this indirect form of contact with the customer causes many problems for both customers and furniture manufacturers. The article presents solutions that would solve problems related to the analysis of data and information in the order fulfillment process sent to post-warranty service. The article also presents an analysis of threats to the security of this information, both for customers and the enterprise.

Keywords: ordering furniture online, information security, furniture industry, enterprise security, risk analysis

Procedia PDF Downloads 29
2955 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection

Authors: Mahshid Arabi

Abstract:

With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.

Keywords: data protection, digital technologies, information security, modern management

Procedia PDF Downloads 12
2954 Identification of Potential Predictive Biomarkers for Early Diagnosis of Preeclampsia Growth Factors to microRNAs

Authors: Sadia Munir

Abstract:

Preeclampsia is the contributor to the worldwide maternal mortality of approximately 100,000 deaths a year. It complicates about 10% of all pregnancies and is the first cause of maternal admission to intensive care units. Predicting preeclampsia is a major challenge in obstetrics. More importantly, no major progress has been achieved in the treatment of preeclampsia. As placenta is the main cause of the disease, the only way to treat the disease is to extract placental and deliver the baby. In developed countries, the cost of an average case of preeclampsia is estimated at £9000. Interestingly, preeclampsia may have an impact on the health of mother or infant, beyond the pregnancy. We performed a systematic search of PubMed including the combination of terms such as preeclampsia, biomarkers, treatment, hypoxia, inflammation, oxidative stress, vascular endothelial growth factor A, activin A, inhibin A, placental growth factor, transforming growth factor β-1, Nodal, placenta, trophoblast cells, microRNAs. In this review, we have summarized current knowledge on the identification of potential biomarkers for the diagnosis of preeclampsia. Although these studies show promising data in early diagnosis of preeclampsia, the current value of these factors as biomarkers, for the precise prediction of preeclampsia, has its limitation. Therefore, future studies need to be done to support some of the very promising and interesting data to develop affordable and widely available tests for early detection and treatment of preeclampsia.

Keywords: activin, biomarkers, growth factors, miroRNA

Procedia PDF Downloads 425
2953 Information Technology in Assessing Risks and Threats in the Transition of the Brand to the Digital Environment

Authors: Spanova Yerkezhan, Amantay Ayan, Alimzhanova Laura

Abstract:

This article discusses the concept of rebranding and its relationship to cybersecurity. Rebranding is the process of changing the appearance and image of a company or organization in order to appeal to new customers or change the perception of a company. It can be a powerful tool for businesses looking to renew their reputation or expand into new markets. In today's digital age, companies increasingly rely on technology and the internet to conduct business; rebranding can also present significant cybersecurity risks. This is because a rebranding effort can create new vulnerabilities for companies, particularly in terms of their online presence. This article explores the potential hazards associated with rebranding and provides recommendations for mitigating those risks. It also highlights the importance of considering cybersecurity in the rebranding process and how it can be integrated into the overall strategy for a successful and secure rebranding.

Keywords: rebranding, cybersecurity, cyberattack, logo, vulnerability

Procedia PDF Downloads 144
2952 Concept for Determining the Focus of Technology Monitoring Activities

Authors: Guenther Schuh, Christina Koenig, Nico Schoen, Markus Wellensiek

Abstract:

Identification and selection of appropriate product and manufacturing technologies are key factors for competitiveness and market success of technology-based companies. Therefore many companies perform technology intelligence (TI) activities to ensure the identification of evolving technologies at the right time. Technology monitoring is one of the three base activities of TI, besides scanning and scouting. As the technological progress is accelerating, more and more technologies are being developed. Against the background of limited resources it is therefore necessary to focus TI activities. In this paper, we propose a concept for defining appropriate search fields for technology monitoring. This limitation of search space leads to more concentrated monitoring activities. The concept will be introduced and demonstrated through an anonymized case study conducted within an industry project at the Fraunhofer Institute for Production Technology. The described concept provides a customized monitoring approach, which is suitable for use in technology-oriented companies especially those that have not yet defined an explicit technology strategy. It is shown in this paper that the definition of search fields and search tasks are suitable methods to define topics of interest and thus to direct monitoring activities. Current as well as planned product, production and material technologies as well as existing skills, capabilities and resources form the basis of the described derivation of relevant search areas. To further improve the concept of technology monitoring the proposed concept should be extended during future research e.g. by the definition of relevant monitoring parameters.

Keywords: monitoring radar, search field, technology intelligence, technology monitoring

Procedia PDF Downloads 451
2951 A Review Paper for Detecting Zero-Day Vulnerabilities

Authors: Tshegofatso Rambau, Tonderai Muchenje

Abstract:

Zero-day attacks (ZDA) are increasing day by day; there are many vulnerabilities in systems and software that date back decades. Companies keep discovering vulnerabilities in their systems and software and work to release patches and updates. A zero-day vulnerability is a software fault that is not widely known and is unknown to the vendor; attackers work very quickly to exploit these vulnerabilities. These are major security threats with a high success rate because businesses lack the essential safeguards to detect and prevent them. This study focuses on the factors and techniques that can help us detect zero-day attacks. There are various methods and techniques for detecting vulnerabilities. Various companies like edges can offer penetration testing and smart vulnerability management solutions. We will undertake literature studies on zero-day attacks and detection methods, as well as modeling approaches and simulations, as part of the study process.

Keywords: zero-day attacks, exploitation, vulnerabilities

Procedia PDF Downloads 86
2950 Enhancing Human Security Through Conmprehensive Counter-terrorism Measures

Authors: Alhaji Khuzaima Mohammed Osman, Zaeem Sheikh Abdul Wadudi Haruna

Abstract:

This article aims to explore the crucial link between counter-terrorism efforts and the preservation of human security. As acts of terrorism continue to pose significant threats to societies worldwide, it is imperative to develop effective strategies that mitigate risks while safeguarding the rights and well-being of individuals. This paper discusses key aspects of counter-terrorism and human security, emphasizing the need for a comprehensive approach that integrates intelligence, prevention, response, and resilience-building measures. By highlighting successful case studies and lessons learned, this article provides valuable insights for policymakers, law enforcement agencies, and practitioners in their quest to address terrorism and foster human security.

Keywords: human security, risk mitigation, terrorist activities, civil liberties

Procedia PDF Downloads 63
2949 Anti-Fire Group 'Peduli Api': Case Study of Mitigating the Fire Hazard Impact and Climate Policy Enhancement on Riau Province Indonesia

Authors: Bayu Rizky Pratama, Hardiansyah Nur Sahaya

Abstract:

Riau Province is the worst emitter for forest burning which causes the huge scale of externality such as declining of forest habitat, health disease, and climate change impact. Indonesia forum of budget transparency for Riau Province (FITRA) reported the length of forest burning reached about 186.069 hectares which is 7,13% of total national forest burning disaster, consisted of 107.000 hectares of peatland and the rest 79.069 hectares of mineral land. Anti-fire group, a voluntary group next to the forest, to help in protecting the forest burning and heavily smoke residual has been established but unfortunately the implementation still far from expectation. This research will emphasize on (1) how the anti-fire group contribute to fire hazard tackling; (2) the identification of SWOT analysis to enhance the group benefit; and (3) government policy implication to maximize the role of Anti-fire group and reduce the case of forest burning as well as heavily smoke which can raise climate change impact. As the observation found some weakness from SWOT identification such as (1) lack of education and training; (2) facility in extinguishing the fire damage; (3) law for economic incentive; (4) communication and field experience; (5) also the reporting the fire case.

Keywords: anti-fire group, forest burning impact, SWOT, climate change mitigation

Procedia PDF Downloads 374
2948 The Sustainable Development for Coastal Tourist Building

Authors: D. Avila

Abstract:

The tourism industry is a phenomenon that has become a growing presence in international socio-economic dynamics, which in most cases exceeds the control parameters in the various environmental regulations and sustainability of existing resources. Because of this, the effects on the natural environment at the regional and national levels represent a challenge, for which a number of strategies are necessary to minimize the environmental impact generated by the occupation of the territory. The hotel tourist building and sustainable development in the coastal zone, have an important impact on the environment and on the physical and psychological health of the inhabitants. Environmental quality associated with the comfort of humans to the sustainable development of natural resources; applied to the hotel architecture this concept involves the incorporation of new demands on all of the constructive process of a building, changing customs of developers and users. The methodology developed provides an initial analysis to determine and rank the different tourist buildings, with the above it will be feasible to establish methods of study and environmental impact assessment. Finally, it is necessary to establish an overview regarding the best way to implement tourism development on the coast, containing guidelines to improve and protect the natural environment. This paper analyzes the parameters and strategies to reduce environmental impacts derived from deployments tourism on the coast, through a series of recommendations towards sustainability, in the context of the Bahia de Banderas, Puerto Vallarta, Jalisco. The environmental impact caused by the implementation of tourism development, perceived in a coastal environment, forcing a series of processes, ranging from the identification of impacts, prediction and evaluation of them. For this purpose are described below, different techniques and valuation procedures: Identification of impacts. Methods for the identification of damage caused to the environment pursue general purpose to obtain a group of negative indicators that are subsequently used in the study of environmental impact. There are several systematic methods to identify the impacts caused by human activities. In the present work, develops a procedure based and adapted from the Ministry of works public urban reference in studies of environmental impacts, the representative methods are: list of contrast, arrays, and networks, method of transparencies and superposition of maps.

Keywords: environmental impact, physical health, sustainability, tourist building

Procedia PDF Downloads 310