Search results for: socially engineered attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1296

Search results for: socially engineered attacks

696 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble

Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi

Abstract:

Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.

Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble

Procedia PDF Downloads 215
695 Earthquake Resistant Sustainable Steel Green Building

Authors: Arup Saha Chaudhuri

Abstract:

Structural steel is a very ductile material with high strength carrying capacity, thus it is very useful to make earthquake resistant buildings. It is a homogeneous material also. The member section and the structural system can be made very efficient for economical design. As the steel is recyclable and reused, it is a green material. The embodied energy for the efficiently designed steel structure is less than the RC structure. For sustainable green building steel is the best material nowadays. Moreover, pre-engineered and pre-fabricated faster construction methodologies help the development work to complete within the stipulated time. In this paper, the usefulness of Eccentric Bracing Frame (EBF) in steel structure over Moment Resisting Frame (MRF) and Concentric Bracing Frame (CBF) is shown. Stability of the steel structures against horizontal forces especially in seismic condition is efficiently possible by Eccentric bracing systems with economic connection details. The EBF is pin–ended, but the beam-column joints are designed for pin ended or for full connectivity. The EBF has several desirable features for seismic resistance. In comparison with CBF system, EBF system can be designed for appropriate stiffness and drift control. The link beam is supposed to yield in shear or flexure before initiation of yielding or buckling of the bracing member in tension or compression. The behavior of a 2-D steel frame is observed under seismic loading condition in the present paper. Ductility and brittleness of the frames are compared with respect to time period of vibration and dynamic base shear. It is observed that the EBF system is better than MRF system comparing the time period of vibration and base shear participation.

Keywords: steel building, green and sustainable, earthquake resistant, EBF system

Procedia PDF Downloads 346
694 Theorising Chinese as a Foreign Language Curriculum Justice in the Australian School Context

Authors: Wen Xu

Abstract:

The expansion of Confucius institutes and Chinese as a Foreign Language (CFL) education is often considered as cultural invasion and part of much bigger, if not ambitious, Chinese central government agenda among Western public opinion. The CFL knowledge and teaching practice inherent in textbooks are also harshly critiqued as failing to align with Western educational principles. This paper takes up these concerns and attempts to articulate that Confucius’s idea of ‘education without discrimination’ appears to have become synonymous with social justice touted in contemporary Australian education and policy discourses. To do so, it capitalises on Bernstein's conceptualization of classification and pedagogic rights to articulate CFL curriculum's potential of drawing in and drawing out curriculum boundaries to achieve educational justice. In this way, the potential useful knowledge of CFL constitutes a worthwhile tool to engage in a peripheral Western country’s education issues, as well as to include disenfranchised students in the multicultural Australian society. It opens spaces for critically theorising CFL curricular justice in Australian educational contexts, and makes an original contribution to scholarly argumentation that CFL curriculum has the potential of including socially and economically disenfranchised students in schooling.

Keywords: curriculum justice, Chinese as a Foreign Language curriculum, Bernstein, equity

Procedia PDF Downloads 142
693 The Effects of European Union’s Bordering Process

Authors: Ebru Dalgakiran

Abstract:

Border and bordering studies have come to the forefront in recent years especially with parallel to increase in international migratory movements. Although conceptualizations of the border and bordering are quite contested within academia, the general point of view is that borders are politically and socially constructed. It means that borders have always their own ‘us vs. them’, and bordering process produce separate identities as well. In that case, Turkey and Greece are notable examples since these two nation-states constructed their borders upon each other’s for years although the Turkish-Greek border was drawn with the Lausanne Treaty of 1923. Nevertheless, on the other hand, The European Union (EU) has been externalized of border management policies to build a stronger area of freedom, security, and justice within the borders. Thus, Turkish-Greek border has become one of the significant external borders of the EU. In this context, this study aims to understand whether the EU’s bordering process through externalizing border management policies can affect Turkey’s and Greece’s bordering processes. By examining official documents of the EU and conducting in-depth interviews with local actors of the border management policies of the EU in Edirne, where is the border city of Turkey with Greece, this study’s main finding is that the EU’s bordering process to control migration at the external borders affects Turkey’s and Greece’s bordering processes. It seems that Turkey and Greece construct their borders upon a common Other, ‘irregular migrants’ now.

Keywords: border, bordering, the European Union, externalization

Procedia PDF Downloads 232
692 Proactive WPA/WPA2 Security Using DD-WRT Firmware

Authors: Mustafa Kamoona, Mohamed El-Sharkawy

Abstract:

Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.

Keywords: Wi-Fi, WPS, TLS, DD-WRT

Procedia PDF Downloads 227
691 Dynamical Analysis of the Fractional-Order Mathematical Model of Hashimoto’s Thyroiditis

Authors: Neelam Singha

Abstract:

The present work intends to analyze the system dynamics of Hashimoto’s thyroiditis with the assistance of fractional calculus. Hashimoto’s thyroiditis or chronic lymphocytic thyroiditis is an autoimmune disorder in which the immune system attacks the thyroid gland, which gradually results in interrupting the normal thyroid operation. Consequently, the feedback control of the system gets disrupted due to thyroid follicle cell lysis. And, the patient perceives life-threatening clinical conditions like goiter, hyperactivity, euthyroidism, hyperthyroidism, etc. In this work, we aim to obtain the approximate solution to the posed fractional-order problem describing Hashimoto’s thyroiditis. We employ the Adomian decomposition method to solve the system of fractional-order differential equations, and the solutions obtained shall be useful to provide information about the effect of medical care. The numerical technique is executed in an organized manner to furnish the associated details of the progression of the disease and to visualize it graphically with suitable plots.

Keywords: adomian decomposition method, fractional derivatives, Hashimoto's thyroiditis, mathematical modeling

Procedia PDF Downloads 209
690 Violence against Women: Exploring Discursive Resistance in the Frames of Gender Violence in South Africa

Authors: Kunle Oparinde, Rachel Matteau-Matsha, Felix Awung

Abstract:

In recent times, the issue of gender-based violence against women in South Africa is prevalent in headlines due to the high rate of attacks directed towards women. Ranging from teenagers to adults, women are continuously targeted indiscriminately in what is seemingly becoming a prolonged cycle in the country. To this end, human rights activists, organisations, and political leaders have managed to somewhat verbally condemn the atrocious acts. Further, interested people in South Africa, through walks and protests, have continued to speak against the swinging violence against women in the country. The thrust in this study is to explore and analyse how discourse (language) has been employed as a resounding voice against gender violence in the country. Through a purposive sampling of materials employed during walks and protests, collected from online sources, we examine how language is being used to combat and confront the issue of gender violence viz-a-viz how it continues to serve as a crucial tool in repelling gender violence.

Keywords: gender, violence, language, discourse, resistance

Procedia PDF Downloads 127
689 Management of the Asthma Crisis in the Unit of Intensive Care of the General Hospital of Reference of Kinshasa

Authors: Eddy K. Mukadi

Abstract:

The aim of this study was to provide contributing elements to improve the management of the asthma crisis in the intensive care unit of the General Reference Hospital of Kinshasa. This was a descriptive study of all patients in the intensive care unit presenting with the asthma attack during the period from February 5, 2013 to February 5, 2014. The main data were obtained from consultation registry and medical records. A total of 35 patients, 21 of whom were male (majority) compared to 14 female. Average age of patients was 46.48 plus or minus 16.98 with extremes ranging from 21-75 years. The clinic was dominated by dyspnea in 100% of cases, followed by rales with 91.4% of cases. In spite of the control of the crisis obtained after the treatment with B2 mimetic by inhalation was introduced A 91.5%; 88% corticosteroids; 80% oxygen, the therapeutic principle recommended for the management of asthma attacks was not respected in the majority of cases. This is why we suggest that improving the quality of care to be administered to patients will yield more adequate results.

Keywords: asthma crisis, intensive care, general hospital, Kinshasa

Procedia PDF Downloads 227
688 Detection Method of Federated Learning Backdoor Based on Weighted K-Medoids

Authors: Xun Li, Haojie Wang

Abstract:

Federated learning is a kind of distributed training and centralized training mode, which is of great value in the protection of user privacy. In order to solve the problem that the model is vulnerable to backdoor attacks in federated learning, a backdoor attack detection method based on a weighted k-medoids algorithm is proposed. First of all, this paper collates the update parameters of the client to construct a vector group, then uses the principal components analysis (PCA) algorithm to extract the corresponding feature information from the vector group, and finally uses the improved k-medoids clustering algorithm to identify the normal and backdoor update parameters. In this paper, the backdoor is implanted in the federation learning model through the model replacement attack method in the simulation experiment, and the update parameters from the attacker are effectively detected and removed by the defense method proposed in this paper.

Keywords: federated learning, backdoor attack, PCA, k-medoids, backdoor defense

Procedia PDF Downloads 106
687 Corporate Socially Responsible and Financial Performance in the Tourism-Related Industries

Authors: Yu Shan Wang

Abstract:

Different from other industries, the structure of the tourism industry depends to a large degree the environmental and cultural resources. The industry has to undertake social responsibilities for its commercial behaviour. This paper refers to the seven dimensions of the KLD STATS in 1991-2011 as the indicator to CSR practices. The purpose is to investigate what CSR activities create significant impacts on accounting-based financials and firm values by delving into different CSR dimensions. Meanwhile, this paper takes into consideration S&P 500 and control variables (firm sizes and financial leverage). In fact, the commercial behavior of the tourism-related industry may result in negative impacts on the economy and the society. Therefore, this paper classifies a positive set of CSR elements and a negative set of CSR elements for the tourism-related industry in order to examine their respective effects on short-term profitability and long-term firm values. This can shed light on which CSR dimensions exhibit significant impacts on CFP better than holistic CSR indicators, and hence provide more useful information to investors and corporates. This paper uses quantile regressions to avoid the impact of outliers in the data set. This helps to offer specific information so that companies can make informed decisions.

Keywords: corporate social responsibility, CSR, firm value, tourism, corporate financial performance, CFP

Procedia PDF Downloads 283
686 VCloud: A Security Framework for VANET

Authors: Wiseborn Manfe Danquah, D. Turgay Altilar

Abstract:

Vehicular Ad-hoc Network (VANET) is an integral component of Intelligent Transport Systems (ITS) that has enjoyed a lot of attention from the research community and the automotive industry. This is mainly due to the opportunities and challenges it presents. Vehicular Ad-hoc Network being a class of Mobile Ad-hoc Networks (MANET) has all the security concerns existing in traditional MANET as well as new security and privacy concerns introduced by the unique vehicular communication environment. This paper provides a survey of the possible attacks in vehicular environment, as well as security and privacy concerns in VANET. It also provides an insight into the development of a comprehensive cloud framework to provide a more robust and secured communication among vehicular nodes and road side units. Our proposal, a Metropolitan Based Public Interconnected Vehicular Cloud (MIVC) infrastructure seeks to provide a more reliable and secured vehicular communication network.

Keywords: mobile Ad-hoc networks, vehicular ad hoc network, cloud, ITS, road side units (RSU), metropolitan interconnected vehicular cloud (MIVC)

Procedia PDF Downloads 351
685 Archetypes in the Rorschach Inkblots: Imparting Universal Meaning in the Face of Ambiguity

Authors: Donna L. Roberts

Abstract:

The theory of archetypes contends that themes based on universal foundational images reside in and are transmitted generationally through the collective unconscious, which is referenced throughout an individual’s experience in order to make sense of that experience. There is then, a profoundly visceral and instinctive agreement on the gestalt of these universal themes and how they apply to the human condition throughout space and time. The inherent nature of projective tests, such as the Rorschach Inkblot, necessitates that the stimulus is ambiguous and thus elicits responses that reflect the unconscious inner psyche of the respondent. As the development of the Rorschach inkblots was relatively random and serendipitous - i.e., the inkblots were not engineered to elicit a specifically defined response - it would stand to reason that without a collective unconscious, every individual would interpret the inkblots in an individualized and unique way. Yet this is not the case. Instead, common themes appear in the images of the inkblots and their interpretation that reflect this deeper iconic understanding. This study analyzed the ten Rorschach inkblots in terms of Jungian archetypes, both with respect to the form of images on each plate and the commonly observed themes in responses. Examples of the archetypes were compared to each of the inkblots, with subsequent descriptions matched to the standard responses. The findings yielded clear and distinct instances of the universal symbolism intrinsic in the inkblot images as well as ubiquitous throughout the responses. This project illustrates the influence of the theories of psychologist Carl Gustav Jung on the interpretation of the ambiguous stimuli. It further serves to demonstrate the merit of Jungian psychology as a valuable tool with which to understand the nature of projective tests in general, Rorschach’s work specifically, and ultimately the broader implications for our collective unconscious and common humanity.

Keywords: archetypes, inkblots, projective tests, Rorschach

Procedia PDF Downloads 103
684 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises

Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh

Abstract:

As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.

Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan

Procedia PDF Downloads 37
683 Women Hashtactivism: Civic Engagement in Saudi Arabia

Authors: Mohammed Ibahrine

Abstract:

One of the prominent trends in the Saudi digital space in recent years is the boom in the use of social networking sites such as Facebook, YouTube, and Twitter. As of 2016, Twitter has over six million users in Saudi Arabia. In the wake of the recent political instability in the Arab region, digital platforms have gained importance for both, personal and professional purposes. A conspicuously observable tide of social activism has risen, with Twitter playing an increasingly important role. One of their primary goals is to enforce the logic of public visibility, social mobility and civic participation in the Saudi society. Saudi women use Twitter to disseminate specific and relevant information and promote their social agenda that remained unrecognized and invisible in the mainstream media and thus in the public sphere. The question is to what extent does Twitter empower Saudi women or reinforces their social immobility and invisibility? This paper focuses on three kinds of empowerment through Twitter in the religiously conservative and socially patriarchal Saudi society. It traces and analyses how Saudi female hashtactivism is increasingly becoming a site of struggle over visibility, mobility, control, and civic participation. The underlying thesis is that Twitter makes a contribution to the development of participatory culture, especially in the lives of women.

Keywords: civic, hashtactivism, Saudi Arabia, Twiterverse

Procedia PDF Downloads 318
682 Domestic and Foreign Terrorism: Evaluation of the Breeding Ground

Authors: T. K. Hung

Abstract:

Terrorism acts have occurred across both developed and developing states, with well-identified motivation and causes. For many years, terrorism eradication has become a major topic yet only passive actions were taken in response to acts. The linkage between the location of terrorism occurrence and breeding ground is not well-documented, resulting in the passive approach used in counter-terrorism nowadays. The evaluation investigates all post-9/11 terrorism affairs considering their state capacity, safety, ease of border access control, religion diversity, and technology access, to measure the level of breeding ground of the states. Those "weak" states with poor border access control, resources capacity and domestic safety are the best breeding ground for terrorists. Although many attacks were caused by religious motivation, religion diversity does not predict the breeding ground. States with censored technology access, particular computer-mediated communication, predict on the terrorism breeding ground, moderated by the level of breeding ground of neighboring states.

Keywords: counter-terrorism, lethality, security, terrorism

Procedia PDF Downloads 334
681 A Robust Digital Image Watermarking Against Geometrical Attack Based on Hybrid Scheme

Authors: M. Samadzadeh Mahabadi, J. Shanbehzadeh

Abstract:

This paper presents a hybrid digital image-watermarking scheme, which is robust against varieties of attacks and geometric distortions. The image content is represented by important feature points obtained by an image-texture-based adaptive Harris corner detector. These feature points are extracted from LL2 of 2-D discrete wavelet transform which are obtained by using the Harris-Laplacian detector. We calculate the Fourier transform of circular regions around these points. The amplitude of this transform is rotation invariant. The experimental results demonstrate the robustness of the proposed method against the geometric distortions and various common image processing operations such as JPEG compression, colour reduction, Gaussian filtering, median filtering, and rotation.

Keywords: digital watermarking, geometric distortions, geometrical attack, Harris Laplace, important feature points, rotation, scale invariant feature

Procedia PDF Downloads 497
680 Current Methods for Drug Property Prediction in the Real World

Authors: Jacob Green, Cecilia Cabrera, Maximilian Jakobs, Andrea Dimitracopoulos, Mark van der Wilk, Ryan Greenhalgh

Abstract:

Predicting drug properties is key in drug discovery to enable de-risking of assets before expensive clinical trials and to find highly active compounds faster. Interest from the machine learning community has led to the release of a variety of benchmark datasets and proposed methods. However, it remains unclear for practitioners which method or approach is most suitable, as different papers benchmark on different datasets and methods, leading to varying conclusions that are not easily compared. Our large-scale empirical study links together numerous earlier works on different datasets and methods, thus offering a comprehensive overview of the existing property classes, datasets, and their interactions with different methods. We emphasise the importance of uncertainty quantification and the time and, therefore, cost of applying these methods in the drug development decision-making cycle. To the best of the author's knowledge, it has been observed that the optimal approach varies depending on the dataset and that engineered features with classical machine learning methods often outperform deep learning. Specifically, QSAR datasets are typically best analysed with classical methods such as Gaussian Processes, while ADMET datasets are sometimes better described by Trees or deep learning methods such as Graph Neural Networks or language models. Our work highlights that practitioners do not yet have a straightforward, black-box procedure to rely on and sets a precedent for creating practitioner-relevant benchmarks. Deep learning approaches must be proven on these benchmarks to become the practical method of choice in drug property prediction.

Keywords: activity (QSAR), ADMET, classical methods, drug property prediction, empirical study, machine learning

Procedia PDF Downloads 77
679 Providing a Secure Hybrid Method for Graphical Password Authentication to Prevent Shoulder Surfing, Smudge and Brute Force Attack

Authors: Faraji Sepideh

Abstract:

Nowadays, purchase rate of the smart device is increasing and user authentication is one of the important issues in information security. Alphanumeric strong passwords are difficult to memorize and also owners write them down on papers or save them in a computer file. In addition, text password has its own flaws and is vulnerable to attacks. Graphical password can be used as an alternative to alphanumeric password that users choose images as a password. This type of password is easier to use and memorize and also more secure from pervious password types. In this paper we have designed a more secure graphical password system to prevent shoulder surfing, smudge and brute force attack. This scheme is a combination of two types of graphical passwords recognition based and Cued recall based. Evaluation the usability and security of our proposed scheme have been explained in conclusion part.

Keywords: brute force attack, graphical password, shoulder surfing attack, smudge attack

Procedia PDF Downloads 157
678 Silver Nanoparticle Application in Food Packaging and Impacts on Food Safety and Consumer’s Health

Authors: Worku Dejene Bekele, András Marczika Csilla Sörös

Abstract:

Silver nanoparticles are silver metal with a size of 1-100nm. The most common source of silver nanoparticles is inorganic salts. Nanoparticles can be ingested through our foods and constitute nanoparticles and silver ions, whether as an additive or by migrants and, in some cases, as a pollutant. Silver nanoparticles are the most widely applicable engineered nanomaterials, especially for antimicrobial function. Ag nanoparticles give different advantages in the case of food safety, quality, and overall acceptability; however, they affect the health of humans and animals, putting them at risk of health problems and environmental pollution. Silver nanoparticles have been used widely in food packaging technologies, especially in water treatments, meat and meat products, fruit, and many other food products. This is for bio-preservation from food products. The primary goal of this review is to determine the safety and health impact of Ag nanoparticles application in food packaging and analysis of the human organs more affected by this preservative technology, to assess the implications of a nanoparticle on food safety, to determine the effects of nanoparticles on consumers health and to determine the impact of nanotechnology on product acceptability. But currently, much research has demonstrated that there is cause to believe that silver nanoparticles may have toxicological effects on biological organs and systems. The silver nanoparticles affect DNA expression, gastrointestinal barriers, lungs, and other breathing organs illness. Silver particles and molecules are very toxic. During its application in food packaging, food industries used the thinnest particle. This particle can potentially affect the gastrointestinal tracts-it suffers from mucus production, DNA, lungs, and other breezing organs. This review is targeted to demonstrate the knowledge gap that industrials use in the application of silver nanoparticles in food packaging and preservation and its health effects on the consumer.

Keywords: food preservatives, health impact, nanoparticle, silver nanoparticle

Procedia PDF Downloads 64
677 The Concept of Equal Pay: Analyzing the Presence of Inequality in the Hospitality Sector with the Perspective of Employees in Gujarat, India

Authors: Vedi Goenka

Abstract:

Inequality refers to unequal treatment or perceptions of individuals based on any particular trait. It arises from differences in socially constructed roles. Women are usually characterized as inferior and weak, who are dependent on their male counterparts. Even though it is claimed that both the genders have been given equal rights, inequality has always been prevalent in the Indian society, from personal to the professional front. There are different types of inequality that persist in the corporate world such as age inequality, gender inequality, tenure inequality and so on. Consequently, wage inequality occurs when employees are equally qualified and perform the same task but, one group of employees is paid more than the other. The hospitality sector is one of the emerging sectors in Gujarat which also experiences a lot of organizational dynamics. The proposed paper focuses on the concept of equal pay which states that pay should be based on the kind and quality of work done and not according to any other aspects. An exploratory attempt to understand the existence of inequality in the Hospitality sector on the basis of income is made in this research. The myth that wage discrimination has always favored men over similarly qualified women is analyzed in this research paper. A structured survey of a sample, representative of the employees of the Hospitality sector is being carried out in this study. An attempt to keep the effects of the environmental factors to a minimum level is made.

Keywords: equal pay, human resources, hospitality sector, inequality, perspective, wage structure

Procedia PDF Downloads 180
676 System for Mechanical Stimulation of the Mesenchymal Stem Cells Supporting Differentiation into Osteogenic Cells

Authors: Jana Stepanovska, Roman Matejka, Jozef Rosina, Marta Vandrovcova, Lucie Bacakova

Abstract:

The aim of this study was to develop a system for mechanical and also electrical stimulation controlling in vitro osteogenesis under conditions more similar to the in vivo bone microenvironment than traditional static cultivation, which would achieve good adhesion, growth and other specific behaviors of osteogenic cells in cultures. An engineered culture system for mechanical stimulation of the mesenchymal stem cells on the charged surface was designed. The bioreactor allows efficient mechanical loading inducing an electrical response and perfusion of the culture chamber with seeded cells. The mesenchymal stem cells were seeded to specific charged materials, like polarized hydroxyapatite (Hap) or other materials with piezoelectric and ferroelectric features, to create electrical potentials for stimulating of the cells. The material of the matrix was TiNb alloy designed for these purposes, and it was covered by BaTiO3 film, like a kind of piezoelectric material. The process of mechanical stimulation inducing electrical response is controlled by measuring electrical potential in the chamber. It was performed a series of experiments, where the cells were seeded, perfused and stimulated up to 48 hours under different conditions, especially pressure and perfusion. The analysis of the proteins expression was done, which demonstrated the effective mechanical and electrical stimulation. The experiments demonstrated effective stimulation of the cells in comparison with the static culture. This work was supported by the Ministry of Health, grant No. 15-29153A and the Grant Agency of the Czech Republic grant No. GA15-01558S.

Keywords: charged surface, dynamic cultivation, electrical stimulation, ferroelectric layers, mechanical stimulation, piezoelectric layers

Procedia PDF Downloads 292
675 Mobile Agent Security Using Reference Monitor Based Security Framework

Authors: Sandhya Armoogum

Abstract:

In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code.

Keywords: security, mobile agents, reference monitor, trust

Procedia PDF Downloads 437
674 A Socio-Technical Approach to Cyber-Risk Assessment

Authors: Kitty Kioskli, Nineta Polemi

Abstract:

Evaluating the levels of cyber-security risks within an enterprise is most important in protecting its information system, services and all its digital assets against security incidents (e.g. accidents, malicious acts, massive cyber-attacks). The existing risk assessment methodologies (e.g. eBIOS, OCTAVE, CRAMM, NIST-800) adopt a technical approach considering as attack factors only the capability, intention and target of the attacker, and not paying attention to the attacker’s psychological profile and personality traits. In this paper, a socio-technical approach is proposed in cyber risk assessment, in order to achieve more realistic risk estimates by considering the personality traits of the attackers. In particular, based upon principles from investigative psychology and behavioural science, a multi-dimensional, extended, quantifiable model for an attacker’s profile is developed, which becomes an additional factor in the cyber risk level calculation.

Keywords: attacker, behavioural models, cyber risk assessment, cybersecurity, human factors, investigative psychology, ISO27001, ISO27005

Procedia PDF Downloads 159
673 Increasing Photosynthetic H2 Production by in vivo Expression of Re-Engineered Ferredoxin-Hydrogenase Fusion Protein in the Green Alga Chlamydomonas reinhardtii

Authors: Dake Xiong, Ben Hankamer, Ian Ross

Abstract:

The most urgent challenge of our time is to replace the depleting resources of fossil fuels by sustainable environmentally friendly alternatives. Hydrogen is a promising CO2-neutral fuel for a more sustainable future especially when produced photo-biologically. Hydrogen can be photosynthetically produced in unicellular green alga like Chlamydomonas reinhardtii, catalysed by the inducible highly active and bidirectional [FeFe]-hydrogenase enzymes (HydA). However, evolutionary and physiological constraints severely restrict the hydrogen yield of algae for industrial scale-up, mainly due to its competition among other metabolic pathways on photosynthetic electrons. Among them, a major challenge to be resolved is the inferior competitiveness of hydrogen production (catalysed by HydA) with NADPH production (catalysed by ferredoxin-NADP+-reductase (FNR)), which is essential for cell growth and takes up ~95% of photosynthetic electrons. In this work, the in vivo hydrogen production efficiency of mutants with ferredoxin-hydrogenase (Fd*-HydA1*) fusion protein construct, where the electron donor ferredoxin (Fd*) is fused to HydA1* and expressed in the model organism C. reinhardtii was investigated. Once Fd*-HydA1* fusion gene is expressed in algal cells, the fusion enzyme is able to draw the redistributed photosynthetic electrons and use them for efficient hydrogen production. From preliminary data, mutants with Fd*-HydA1* transgene showed a ~2-fold increase in the photosynthetic hydrogen production rate compared with its parental strain, which only possesses the native HydA in vivo. Therefore, a solid method of having more efficient hydrogen production in microalgae can be achieved through the expression of the synthetic enzymes.

Keywords: Chlamydomonas reinhardtii, ferredoxin, fusion protein, hydrogen production, hydrogenase

Procedia PDF Downloads 257
672 Efficient L-Xylulose Production Using Whole-Cell Biocatalyst With NAD+ Regeneration System Through Co-Expression of Xylitol Dehydrogenase and NADH Oxidase in Escherichia Coli

Authors: Mesfin Angaw Tesfay

Abstract:

L-Xylulose is a potentially valuable rare sugar used as starting material for antiviral and anticancer drug development in pharmaceutical industries. L-Xylulose exist in a very low concentration in nature and have to be synthesized from cheap starting materials such as xylitol through biotechnological approaches. In this study, cofactor engineering and deep eutectic solvent were applied to improve the efficiency of L-xylulose production from xylitol. A water-forming NAD+ regeneration enzyme (NADH oxidase) from Streptococcus mutans ATCC 25175 was introduced into E. coli with xylitol-4-dehydrogenase (XDH) of Pantoea ananatis resulting in recombinant cells harboring the vector pETDuet-xdh-SmNox. Further, three deep eutectic solvents (DES) including, Choline chloride/glycerol (ChCl/G), Choline chloride/urea (ChCl/U), and Choline chloride/ethylene glycol (ChCl/EG) have been employed to facilitate the conversion efficiency of L-xylulose from xylitol. The co-expression system exhibited optimal activity at a temperature of 37 ℃ and pH 8.5, and the addition of Mg2+ enhanced the catalytic activity by 1.19-fold. Co-expression of NADH oxidase with XDH enzyme resulted in increased L-xylulose concentration and productivity from xylitol as well as the intracellular NAD+ concentration. Two of the DES used (ChCl/U and ChCl/EG) show positive effects on product yield and the ChCl/G has inhibiting effects. The optimum concentration of ChCl/U was 2.5%, which increased the L-xylulose yields compared to the control without DES. In a 1 L fermenter the final concentration and productivity of L-xylulose from 50 g/L of xylitol reached 48.45 g/L, and 2.42 g/L.h respectively, which was the highest report. Overall, this study is a suitable approach for large-scale production of L-xylulose from xylitol using the engineered E. coli cell.

Keywords: Xylitol-4-dehydrogenase, NADH oxidase, L-xylulose, Xylitol, Coexpression, DESs

Procedia PDF Downloads 8
671 An Industrial Scada System Remote Control Using Mobile Phones

Authors: Ahmidah Elgali

Abstract:

SCADA is the abbreviation for "Administrative Control And Data Acquisition." SCADA frameworks are generally utilized in industry for administrative control and information securing of modern cycles. Regular SCADA frameworks use PC, journal, slim client, and PDA as a client. In this paper, a Java-empowered cell phone has been utilized as a client in an example SCADA application to show and regulate the place of an example model crane. The paper presents a genuine execution of the online controlling of the model crane through a cell phone. The remote correspondence between the cell phone and the SCADA server is performed through a base station by means of general parcel radio assistance GPRS and remote application convention WAP. This application can be used in industrial sites in areas that are likely to be exposed to a security emergency (like terrorist attacks) which causes the sudden exit of the operators; however, no time to perform the shutdown procedures for the plant. Hence this application allows shutting down units and equipment remotely by mobile and so avoids damage and losses.

Keywords: control, industrial, mobile, network, remote, SCADA

Procedia PDF Downloads 72
670 Numerical Investigation of Wave Run-Up on Curved Dikes

Authors: Suba Periyal Subramaniam, Babette Scheres, Altomare Corrado, Holger Schuttrumpf

Abstract:

Due to the climatic change and the usage of coastal areas, there is an increasing risk of dike failures along the coast worldwide. Wave run-up plays a key role in planning and design of a coastal structure. The coastal dike lines are bent either due to geological characteristics or due to influence of anthropogenic activities. The effect of the curvature of coastal dikes on wave run-up and overtopping is not yet investigated. The scope of this research is to find the effects of the dike curvature on wave run-up by employing numerical model studies for various dike opening angles. Numerical simulation is carried out using DualSPHysics, a meshless method, and OpenFOAM, a mesh-based method. The numerical results of the wave run-up on a curved dike and the wave transformation process for various opening angles, wave attacks, and wave parameters will be compared and discussed. This research aims to contribute a more precise analysis and understanding the influence of the curvature in the dike line and thus ensuring a higher level of protection in the future development of coastal structures.

Keywords: curved dikes, DualSPHysics, OpenFOAM, wave run-up

Procedia PDF Downloads 145
669 Plasma Engineered Nanorough Substrates for Stem Cells in vitro Culture

Authors: Melanie Macgregor-Ramiasa, Isabel Hopp, Patricia Murray, Krasimir Vasilev

Abstract:

Stem cells based therapies are one of the greatest promises of new-age medicine due to their potential to help curing most dreaded conditions such as cancer, diabetes and even auto-immune disease. However, establishing suitable in vitro culture materials allowing to control the fate of stem cells remain a challenge. Amongst the factor influencing stem cell behavior, substrate chemistry and nanotopogaphy are particularly critical. In this work, we used plasma assisted surface modification methods to produce model substrates with tailored nanotopography and controlled chemistry. Three different sizes of gold nanoparticles were bound to amine rich plasma polymer layers to produce homogeneous and gradient surface nanotopographies. The outer chemistry of the substrate was kept constant for all substrates by depositing a thin layer of our patented biocompatible polyoxazoline plasma polymer on top of the nanofeatures. For the first time, protein adsorption and stem cell behaviour (mouse kidney stem cells and mesenchymal stem cells) were evaluated on nanorough plasma deposited polyoxazoline thin films. Compared to other nitrogen rich coatings, polyoxazoline plasma polymer supports the covalent binding of proteins. Moderate surface nanoroughness, in both size and density, triggers cell proliferation. In association with polyoxazoline coating, cell proliferation is further enhanced on nanorough substrates. Results are discussed in term of substrates wetting properties. These findings provide valuable insights on the mechanisms governing the interactions between stem cells and their growth support.

Keywords: nanotopography, stem cells, differentiation, plasma polymer, oxazoline, gold nanoparticles

Procedia PDF Downloads 276
668 Identity Conflict between Social and Business Entrepreneurs: The Challenge of Constructing a Novel Social Identity

Authors: Rui G. Serôdio, Carina Martins, Alexandra Serra, José A. Lima, Luísa Catita, Paula Lopes

Abstract:

Building on social identity approach, we tested the impact of social categorization and comparison in the psychosocial process by which social entrepreneurs define their group identity. Specifically, we address how both differentiation and assimilation processes are set of in the context of constructing a novel, distinctive and socially salient – social entrepreneurs. As part of a larger research line, a quasi-experimental study with Social and Business Entrepreneurs, as well as “Lay People” provided evidence consistent with our predictions: (1) Social Entrepreneurs, in contrast with Lay People and Business Entrepreneurs, value more strongly social identity than personal identity, and the later is the only group that values Personal Differentiation; (2) unlike Entrepreneurs, Social Entrepreneurs display an ingroup bias across group evaluations; (3) Lay People, display a self-serving bias, although, overall, they allocate a more positive image to the target groups; (4) combining own vs. others evaluations across all groups, Social Entrepreneurs receive the more positive value. From the standpoint of social identity and self-categorization theories and their approach to group process, we discuss the processes of intergroup comparison and differentiation as core processes in the construction of a positive social identity. We illustrate it within the context of social entrepreneurship, a political and social “wave” that flows across Europe at this time.

Keywords: group processes, social entrepreneurship, social identity, business entrepreneurs

Procedia PDF Downloads 689
667 Intrusion Detection System Based on Peer to Peer

Authors: Alireza Pour Ebrahimi, Vahid Abasi

Abstract:

Recently by the extension of internet usage, Research on the intrusion detection system takes a significant importance. Many of improvement systems prevent internal and external network attacks by providing security through firewalls and antivirus. In recently years, intrusion detection systems gradually turn from host-based systems and depend on O.S to the distributed systems which are running on multiple O.S. In this work, by considering the diversity of computer networks whit respect to structure, architecture, resource, services, users and also security goals requirement a fully distributed collaborative intrusion detection system based on peer to peer architecture is suggested. in this platform each partner device (matched device) considered as a peer-to-peer network. All transmitted information to network are visible only for device that use security scanning of a source. Experimental results show that the distributed architecture is significantly upgradeable in respect to centralized approach.

Keywords: network, intrusion detection system, peer to peer, internal and external network

Procedia PDF Downloads 543