Search results for: cyber resilience
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1204

Search results for: cyber resilience

574 Impact of 6-Week Brain Endurance Training on Cognitive and Cycling Performance in Highly Trained Individuals

Authors: W. Staiano, S. Marcora

Abstract:

Introduction: It has been proposed that acute negative effect of mental fatigue (MF) could potentially become a training stimulus for the brain (Brain endurance training (BET)) to adapt and improve its ability to attenuate MF states during sport competitions. Purpose: The aim of this study was to test the efficacy of 6 weeks of BET on cognitive and cycling tests in a group of well-trained subjects. We hypothesised that combination of BET and standard physical training (SPT) would increase cognitive capacity and cycling performance by reducing rating of perceived exertion (RPE) and increase resilience to fatigue more than SPT alone. Methods: In a randomized controlled trial design, 26 well trained participants, after a familiarization session, cycled to exhaustion (TTE) at 80% peak power output (PPO) and, after 90 min rest, at 65% PPO, before and after random allocation to a 6 week BET or active placebo control. Cognitive performance was measured using 30 min of STROOP coloured task performed before cycling performance. During the training, BET group performed a series of cognitive tasks for a total of 30 sessions (5 sessions per week) with duration increasing from 30 to 60 min per session. Placebo engaged in a breathing relaxation training. Both groups were monitored for physical training and were naïve to the purpose of the study. Physiological and perceptual parameters of heart rate, lactate (LA) and RPE were recorded during cycling performances, while subjective workload (NASA TLX scale) was measured during the training. Results: Group (BET vs. Placebo) x Test (Pre-test vs. Post-test) mixed model ANOVA’s revealed significant interaction for performance at 80% PPO (p = .038) or 65% PPO (p = .011). In both tests, groups improved their TTE performance; however, BET group improved significantly more compared to placebo. No significant differences were found for heart rate during the TTE cycling tests. LA did not change significantly at rest in both groups. However, at completion of 65% TTE, it was significantly higher (p = 0.043) in the placebo condition compared to BET. RPE measured at ISO-time in BET was significantly lower (80% PPO, p = 0.041; 65% PPO p= 0.021) compared to placebo. Cognitive results in the STROOP task showed that reaction time in both groups decreased at post-test. However, BET decreased significantly (p = 0.01) more compared to placebo despite no differences accuracy. During training sessions, participants in the BET showed, through NASA TLX questionnaires, constantly significantly higher (p < 0.01) mental demand rates compared to placebo. No significant differences were found for physical demand. Conclusion: The results of this study provide evidences that combining BET and SPT seems to be more effective than SPT alone in increasing cognitive and cycling performance in well trained endurance participants. The cognitive overload produced during the 6-week training of BET can induce a reduction in perception of effort at a specific power, and thus improving cycling performance. Moreover, it provides evidence that including neurocognitive interventions will benefit athletes by increasing their mental resilience, without affecting their physical training load and routine.

Keywords: cognitive training, perception of effort, endurance performance, neuro-performance

Procedia PDF Downloads 121
573 US-ASEAN Counter Terrorism Cooperation: Maintaining International Security and Avoiding Muslim Stereotypes

Authors: Jordan Daud, Satriya Wibawa, Wahyu Wardhana

Abstract:

The US Global War on Terror has had effect on Southeast Asia as Second Front of Global War on Terror. Since 2001, ASEAN had adopted legal framework to counter the terrorist threat through numerous approach which accommodate various counterterrorism policy of the ten member states. ASEAN have also enhanced multilateral cooperation with US and its allies in Asia Pacific region in addressing terrorist threat, terrorist funding, cyber terrorism and other forms of terrorism. This cooperation is essential to maintain international security and stability and also assure economic development. This work focuses on the US-ASEAN counterterrorism cooperation due to they identified terrorism as a mutual enemy that posed to human security, infrastructure security, and national security. Having in mind that international terrorism usually connected with Muslim community, this paper will also elaborate the concept of Jihad and Islam revivalism in politics to avoid negative image of Islam and Muslim. This paper argues that as region with large Muslim community, Southeast Asia still need to tighten counter terrorism cooperation and also lessening Muslim stereotypes with terrorism through educating public understanding and inter-faith and intra-faith dialogue to create a better world.

Keywords: ASEAN, U.S., counter terrorism, Muslim stereotypes

Procedia PDF Downloads 247
572 Sustainable Agriculture in Nigeria: Integrating Energy Efficiency and Renewables

Authors: Vicx Farm

Abstract:

This paper examines the critical role of energy efficiency management and renewable energy in fostering sustainable agricultural practices in Nigeria. With the growing concerns over energy security, environmental degradation, and climate change, there is an urgent need to transition towards more sustainable energy sources and practices in the agricultural sector. Nigeria, being a significant player in the global agricultural market, stands to benefit immensely from integrating energy efficiency measures and renewable energy solutions into its agricultural activities. This paper discusses the current energy challenges facing Nigerian agriculture, explores the potential benefits of energy efficiency and renewable energy adoption, and proposes strategies for effective implementation. The paper concludes with recommendations for policymakers, stakeholders, and practitioners to accelerate the adoption of energy-efficient and renewable energy technologies in Nigerian agriculture, thereby promoting sustainable development and resilience in the sector.

Keywords: energy, agriculture, sustainability, power

Procedia PDF Downloads 74
571 Parenting Interventions for Refugee Families: A Systematic Scoping Review

Authors: Ripudaman S. Minhas, Pardeep K. Benipal, Aisha K. Yousafzai

Abstract:

Background: Children of refugee or asylum-seeking background have multiple, complex needs (e.g. trauma, mental health concerns, separation, relocation, poverty, etc.) that places them at an increased risk for developing learning problems. Families encounter challenges accessing support during resettlement, preventing children from achieving their full developmental potential. There are very few studies in literature that examine the unique parenting challenges refugee families’ face. Providing appropriate support services and educational resources that address these distinctive concerns of refugee parents, will alleviate these challenges allowing for a better developmental outcome for children. Objective: To identify the characteristics of effective parenting interventions that address the unique needs of refugee families. Methods: English-language articles published from 1997 onwards were included if they described or evaluated programmes or interventions for parents of refugee or asylum-seeking background, globally. Data were extracted and analyzed according to Arksey and O’Malley’s descriptive analysis model for scoping reviews. Results: Seven studies met criteria and were included, primarily studying families settled in high-income countries. Refugee parents identified parenting to be a major concern, citing they experienced: alienation/unwelcoming services, language barriers, and lack of familiarity with school and early years services. Services that focused on building the resilience of parents, parent education, or provided services in the family’s native language, and offered families safe spaces to promote parent-child interactions were most successful. Home-visit and family-centered programs showed particular success, minimizing barriers such as transportation and inflexible work schedules, while allowing caregivers to receive feedback from facilitators. The vast majority of studies evaluated programs implementing existing curricula and frameworks. Interventions were designed in a prescriptive manner, without direct participation by family members and not directly addressing accessibility barriers. The studies also did not employ evaluation measures of parenting practices or the caregiving environment, or child development outcomes, primarily focusing on parental perceptions. Conclusion: There is scarce literature describing parenting interventions for refugee families. Successful interventions focused on building parenting resilience and capacity in their native language. To date, there are no studies that employ a participatory approach to program design to tailor content or accessibility, and few that employ parenting, developmental, behavioural, or environmental outcome measures.

Keywords: asylum-seekers, developmental pediatrics, parenting interventions, refugee families

Procedia PDF Downloads 165
570 Molecular Timeline Analysis of Acropora: Review of Coral Development, Growth and Environmental Resilience

Authors: Ariadna Jalife Gómez, Claudia Rangel Escareño

Abstract:

The Acropora coral genus has experienced impactful consequences of climate change, especially in terms of population reduction related to limited thermal tolerance, however, comprehensive resources for genetic responses of these corals to phenomena are lacking. Thus, this study aims to identify key genes expressed across different developmental stages and conditions of Acropora spp. highlighted in published studies given the shared tissue and polyp-level characteristics among the species comprising the genus, as it is hypothesized that common reproductive, developmental, and stress response mechanisms are conserved. The presented resources, aiming to streamline the genus’ biology, elucidate several signaling pathways of development and stress response that contribute to the understanding of researchers of overall biological responses, while providing a genetic framework for potential further studies that might contribute to reef preservation strategies.

Keywords: acropora, development, genes, transcriptomics

Procedia PDF Downloads 13
569 Measuring Tail-Risk Spillover in the International Banking Industry

Authors: Lidia Sanchis-Marco, Antonio Rubia

Abstract:

In this paper we analyze the state-dependent risk-spillover in different economic areas. To this end, we apply the quantile regression-based methodology developed in Adams, Füss and Gropp approach to examine the spillover in conditional tails of daily returns of indices of the banking industry in the US, BRICs, Peripheral EMU, Core EMU, Scandinavia, the UK and Emerging Markets. This methodology allow us to characterize size, direction and strength of financial contagion in a network of bilateral exposures to address cross-border vulnerabilities under different states of the economy. The general evidence shows as the spillover effects are higher and more significant in volatile periods than in tranquil ones. There is evidence of tail spillovers of which much is attributable to a spillover from the US on the rest of the analyzed regions, specially on European countries. In sharp contrast, the US banking system show more financial resilience against foreign shocks.

Keywords: spillover effects, Bank Contagion, SDSVaR, expected shortfall, VaR, expectiles

Procedia PDF Downloads 495
568 Second Order Journalism: A Study of Selected Niche Authorities on Facebook and Twitter

Authors: Yvonne Dedzo

Abstract:

Social media has become a powerful tool in bridging the distance between individuals regardless of their location. It has become a convenient platform for public discussion and, consequently, generated the phenomenon of citizen journalists who have become both proactive and reactive participants in the dissemination of news, information and other epochal and historical events. This phenomenon has fueled the growth of niche authorities who deliver exceptional democratically consequential information online. This study, therefore, investigates how some selected niche authorities maintain their status on social media. Using the selective processes theory, the study further interrogates the information shared by niche authorities and further analyses the extent to which a public interest-altruistic motive or personal interest-self-serving motive drives their agenda of new sharing and usage. Through cyber-ethnography and, qualitative content analysis and semi-structured interviews, data was gathered and analysed from the posts of two purposely selected niche authorities on Facebook and Twitter. The findings indicate that niche authorities maintain their status by being consistent, prompt, informative, resourceful and interactive in their postings on the social media platform. The study also discovered that even though niche authorities are motivated by both public interest-altruism and interest-self-serving, the latter had a higher of motivation than the former.

Keywords: social medida, citizen journalist, niche authorities, selective processes theory

Procedia PDF Downloads 69
567 More than Words: Literature Review of Sexual Culture for People Who are Deaf

Authors: Eliza F. Dunn

Abstract:

Scripts are a hypothetical outline or roadmap to life as defined by culture. Sexual scripts are similarly a roadmap for what to expect in dating and sexual experiences. The articles for this review were found by searching three databases and refining 621 articles to 13 that are used in the results section. Some ways deaf sexual scripts vary from Traditional Sexual Scripts (TSS) are in the areas of gendered roles and sexual themes, which were both absent in deaf sexual scripts. Theories for why these differences exist are explored: the presence or absence of sexual education or the effects of intimate partner violence due to being a part of a disabled community. Finally, unique sexual flourishing for people who are d/Deaf found in studies was discussed, suggesting the needed perspective of resilience to be a focus of future research to fully understand deaf sexual scripts. Future research is discussed, noting the need for defining aspects of deaf sexual scripts in detail and studying the differences between these scripts and the TSS.

Keywords: deaf, deafness, sexual scripts, lift scripts, sexual flourishing

Procedia PDF Downloads 58
566 The City Narrated from the Hill, Evaluation of Natural Fabric in Urban Plans: A Case Study of Santiago de Chile

Authors: Monica Sanchez

Abstract:

What responsibility does urban planning have on climate changes? How does the territory give us answers of resilience? Historically, urban plans have civilized territories: waters are channeled, grounds are sealed, foreign species are incorporated, native ones are extinguished, and/or enclosed spaces are heated or cooled. Socially this facilitates coexistence, but in turn brings negative environmental consequences. The past fifty years, mankind has tried to redirect these consequences through different strategies. Research studies produced strategies designed to alleviate climate change. Exploring the nature of territories has been incorporated in urban planning to discover natures response. The case to be studied is Santiago, Chile: for its combined impacts of climate change and the significant response by this city on climate governance in the last decades. Warmer areas in Santiago are seen in the areas of high-density buildings such as the commune of Recoleta, while the coldest are characterized by the predominance of low residential densities as the commune of Providencia. These two communes are separated and complemented by an undulating body that comes from the Andes mountains called San Cristobal Hill. What if the hill were taken into account when making roads, zoning and buildings? Was it difficult to prolong in the urban plans the hill characteristics to the city solving the intersection with other natural areas? Apparently it was, because the projected-profile informs us that the planned strategies used correspond to the same operations used in the flat areas of Santiago. This research focuses on: explaining the geographic relationships between city-hill; explaining the planning process around the hill with a morphological analysis; evaluating how the hill has been considered the in the city in the plans that intended to cushion the environmental impacts and studying what is missing on the hill and city to strengthen their integration. Therefore, the research will have different scales of understanding: addressing territorial scale -understanding the vegetation, topography and hydrology; a city scale -analyzing urban plans that Santiago has dealt with the environment and city; and a local scale -studying the integration and public spaces and coverage- norms of the adjacent communes. The expected outcome is to decipher possible deficits and capabilities of the current urban plans for climate change. It is anticipated that the hill and valley is now trying to reconcile after such a long separation. Yet it seems that never will prevail all the Rules of Nature, but the Urban Rules. The plans will require pruning, irrigation, control of invasive alien species and public safety standards, but will be rejoining a dose of nature with the building environment -this will protect us better from it from the time that we feared from it and knew little about it. Today we know a little more, enough to adapt to the process. Although nature is not perceived and we ignore it, it has a remarkable ability to respond.

Keywords: resilience, climate change, urban plans, land use, hills and cities, heat islands, morphology

Procedia PDF Downloads 368
565 Transforming Public Administration in the Digital Era: Challenges and Opportunities

Authors: Catalina Oana Dumitrescu, Andreea L. Drugau-constantin

Abstract:

In the digital age, public administration is facing profound change, fueled by technological advances and the growing demands of citizens for efficient, accessible and transparent services. This paper explores how new digital technologies – including artificial intelligence, blockchain, big data and e-governance solutions – are reshaping the functioning of public administrations globally. In addition to the obvious opportunities to streamline and optimize processes, digital transformation brings with it major challenges, such as cyber security, personal data protection, resistance to change and the need to develop new skills for employees. The paper aims to provide a discussion platform for public administration experts, policy makers and technology innovators to consider how governments can balance the benefits and risks of digital transformation. Topics such as the reconfiguration of administrative processes, the creation of interoperable government systems, the involvement of citizens in public decisions through digital platforms, and solutions for reducing the digital gap between developed and developing regions will be addressed. In conclusion, the digital transformation of public administration is not only an opportunity for modernization, but also a necessity to respond to the new demands and challenges of contemporary society. This paper will provide new insights into the role of technology in improving the quality of governance and public services.

Keywords: public administration, digital ERA, technology, government systems, global

Procedia PDF Downloads 19
564 The Role of the Defense and Future War in Ukraine

Authors: Matthew J. Flynn

Abstract:

In early 2022, a thirty-mile column of Russian armor and assault vehicles sat poised to move south on the road to Kiev. That force has withdrawn as the Russians concentrate on attacking eastern Ukraine. Vladimir Putin’s armies appear content to destroy cities in an effort to attrit the Ukrainian will to continue fighting. That pivot signifies the acceptance of the ascendancy of the defense that now dictates any battlefield world-wide. To defeat what military theorist Carl von Clausewitz labeled “the stronger form of war” with a successful offensive requires an exercise in future war. In the past, the ascendancy of the defense has been overcome by a number of things including the application of superior leadership, better technology, organizational adaptation, and surpassing environmental limitations. A look at how each of these factors came to impact battle can tell us a great deal about what Ukraine means to tomorrow’s fight, and where the focus should lie to win the next war. Civilians presently secure the defensive ascendancy impacting warfare by dominating the shifts from domain to domain thanks to controlling access to cyberspace. That mandate will be tested and eventually falter. This paper tests the desirability of that proposition, as well as hoping for something more from humanity other than repeated and frequent wars making future war look much like past wars. As nations struggle to control cyberspace, a referendum on war as part of the human condition comes into focus.

Keywords: cyber, domains, future war, Putin, Ukraine

Procedia PDF Downloads 114
563 Knowledge Integration from Concept to Practice: An Exploratory Study of Designing a Flood Resilient Urban Park in Viet Nam

Authors: To Quyen Le, Oswald Devisch, Tu Anh Trinh, Els Hannes

Abstract:

Urban centres worldwide are affected differently by flooding. In Vietnam this impact is increasingly negative caused by a process of rapid urbanisation. Traditional spatial planning and flood mitigation planning are not able to deal with this growing threat. This article therefore proposes to focus on increasing the participation of local communities in flood control and management. It explores, on the basis of a design studio exercise, how lay knowledge on flooding can be integrated within planning processes. The article presents a theoretical basis for the structured criterion for site selection for a flood resilient urban park from the perspective of science, then discloses the tacit and explicit knowledge of the flood-prone area and finally integrates this knowledge into the design strategies for flood resilient urban park design.

Keywords: analytic hierarchy process, AHP, design resilience, flood resilient urban park, knowledge integration

Procedia PDF Downloads 179
562 Does One Size Fit All: Immigrant Youths, Bullying and Peer-Aggression

Authors: Shila Khayambashi

Abstract:

For the past few decades, Western researchers studied different youth issues, such as bullying, peer-aggression, depression, self-harm, and suicide, in a formulated and standardized manner. These researchers have grounded their studies upon a series of introduced characteristics and traits, which pragmatically defined the action of the individuals involved in these activities (Olweus, 1994). The phenomena of bullying and peer-aggression have touched the lives of many immigrant youths, as well. However, in the case of these immigrant young adults, the Police investigated, and later dismissed, the victims’ involvement in drugs and gangs’ activities, instead of questioning the possibility of the peer-aggression. This paper argues that neither government officials nor school personnel has ever investigated any cyber-documentation which would clarify these youth’s untimely deaths or search for any indication of peer-aggression at school. Through my ongoing research, I will problematize the Eurocentric definition of bullying and its limitations. I question the assumed universality of these definitions’ characteristics and their lack of minority representation. This research questions explicitly the positionality of the displaced youth within the promised multiculturality of Canada. I will ask: Does one size fit all, considering the bio-psycho-socio-economic differences between the Eastern and the Western worlds? More importantly, how does the epidemy of the communicative devices, like smartphones, and communicative apps, like Twitter and Snapchats, facilitate or hinder peer-aggression for the displaced youths?

Keywords: Bullying , Immigrant youths, Peer aggression, Minority population

Procedia PDF Downloads 133
561 Readiness of Military Professionals for Challenging Situations

Authors: Petra Hurbišová, Monika Davidová

Abstract:

The article deals with the readiness of military professionals for challenging situations. It discusses higher requirements on the psychical endurance of military professionals arising from the specific nature of the military occupation, which is typical for being very difficult to maintain regularity, which is in accordance with the hygiene of work alternated by relaxation. The soldier must be able to serve in the long term and constantly intense performance that goes beyond human tolerance to stress situations. A challenging situation is always associated with overcoming difficulties, obstacles and complicated circumstances or using unusual methods, ways and means to achieve the desired (expected) objectives, performing a given task or satisfying an important need. This paper describes the categories of challenging situations, their classification and characteristics. Attention is also paid to the formation of personality in challenging situations, coping with stress in challenging situations, Phases of solutions of stressful situations, resistance to challenging life situations and its factors. Finally, the article is focused on increasing the readiness of military professionals for challenging situations.

Keywords: coping, challenging situations, stress, stressful situations, military professionals, resilience

Procedia PDF Downloads 317
560 Agroecology Approaches Towards Sustainable Agriculture and Food System: Reviewing and Exploring Selected Policies and Strategic Documents through an Agroecological Lens

Authors: Dereje Regasa

Abstract:

The global food system is at a crossroads, which requires prompt action to minimize the effects of the crises. Agroecology is gaining prominence due to its contributions to sustainable food systems. To support efforts in mitigating the crises, the Food and Agriculture Organization (FAO) established alternative approaches for sustainable agri-food systems. Agroecological elements and principles were developed to guide and support measures that countries need to achieve the Sustainable Development Goals (SDGs). The SDGs require the systemic integration of practices for a smart intensification or adaptation of traditional or industrial agriculture. As one of the countries working towards SDGs, the agricultural practices in Ethiopia need to be guided by these agroecological elements and principles. Aiming at the identification of challenging aspects of a sustainable agri-food system and the characterization of an enabling environment for agroecology, as well as exploring to what extent the existing policies and strategies support the agroecological transition process, five policy and strategy documents were reviewed. These documents are the Rural Development Policy and Strategy, the Environment Policy, the Biodiversity Policy, and the Soil Strategy of the Ministry of Agriculture (MoA). Using the Agroecology Criteria Tool (ACT), the contents were reviewed, focusing on agroecological requirements and the inclusion of sustainable practices. ACT is designed to support a self-assessment of elements supporting agroecology. For each element, binary values were assigned based on the inclusion of the minimum requirements index and then validated through discussion with the document owners. The results showed that the documents were well below the requirements for an agroecological transition of the agri-food system. The Rural Development Policy and Strategy only suffice to 83% in Human and Social Value. It does not support the transition concerning the other elements. The Biodiversity Policy and Soil Strategy suffice regarding the inclusion of Co-creation and Sharing of knowledge (100%), while the remaining elements were not considered sufficiently. In contrast, the Environment Policy supports the transition with three elements accounting for 100%. These are Resilience, Recycling, and Human and Social Care. However, when the four documents were combined, elements such as Synergies, Diversity, Efficiency, Human and Social value, Responsible governance, and Co-creation and Sharing of knowledge were identified as fully supportive (100%). This showed that the policies and strategies complemented one another to a certain extent. However, the evaluation results call for improvements concerning elements like Culture and food traditions, Circular and solidarity economy, Resilience, Recycling, and Regulation and balance since the majority of the elements were not sufficiently observed. Consequently, guidance for the smart intensification of local practices is needed, as well as traditional knowledge enriched with advanced technologies. Ethiopian agricultural and environmental policies and strategies should provide sufficient support and guidance for the intensification of sustainable practices and should provide a framework for an agroecological transition towards a sustainable agri-food system.

Keywords: agroecology, diversity, recycling, sustainable food system, transition

Procedia PDF Downloads 88
559 Explaining the Changes in Contentious Politics of China: A Comparative Study of Falun Gong and 'Diaosi'

Authors: Larry Lai, Evans Leung

Abstract:

Falun gong is a self-proclaimed religious group that has been under crackdown by Beijing for more than two decades. Diaosi, on the other hand, is an emerging community with members loosely connected on the internet through different online social platforms, centering around the sharing of different hobbies and interests. Diaosi community has been transformed from a potential threat to the Chinese authority for different causes to a pro-government force. This paper seeks to explain the different strategies adopted by the People's Republic of China (PRC) regime in handling these two potential threatening communities. Both communities share some obvious similarities: (1) both have massive nation-wide participation; (2) both have attempted to challenge the PRC's authority through contentious means; (3) both have high level of mobility, online or offline; and (4) both have at first been unnoticed until the threat against the PRC have taken form. But the strategies the PRC endorsed against the communities were, in many ways, different. The question is: if the strategy against Falun Gong has been an effective one, why used other strategies against Diaosi? The authors argue that the main reason for using different strategies lies in the differences between the two communities in terms of (i) the nature of the groups, and (ii) the group dynamics. Lastly, based on this analysis, the authors attempt to explore the possible strategies that the PRC would adopt against the Hong Kong cyber-world political community in light of the latest national security law in Hong Kong.

Keywords: contentious politics, Diaosi, Falun Gong, Hong Kong, People's Republic of China

Procedia PDF Downloads 146
558 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification

Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang

Abstract:

One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.

Keywords: malware detection, network security, targeted attack, computational intelligence

Procedia PDF Downloads 267
557 Sustainability in Tourism and Hospitality Industry in China: Best Practices and Challenges

Authors: Mkhitaryan Davit

Abstract:

The tourism and hospitality industry plays a significant role in China's economy, but it also poses environmental, social, and economic challenges. This paper examines the concept of sustainability within the context of China's tourism and hospitality industry, exploring best practices from 26 Hotels in 15 cities and identifying key challenges. Drawing upon a comprehensive review of existing literature, case studies, and interviews with industry experts, the paper highlights successful sustainability initiatives implemented by various stakeholders, including government bodies, businesses, and non-governmental organizations. Additionally, it discusses the barriers and obstacles hindering the widespread adoption of sustainable practices in the sector, such as lack of awareness, financial constraints, and regulatory issues. The findings provide insights for policymakers, industry practitioners, and researchers to develop strategies and solutions for promoting sustainable tourism and hospitality practices in China, ultimately contributing to the long-term viability and resilience of the industry.

Keywords: sustainability, waste management, renewable energy, hospitality

Procedia PDF Downloads 53
556 Development of Web-Based Remote Desktop to Provide Adaptive User Interfaces in Cloud Platform

Authors: Shuen-Tai Wang, Hsi-Ya Chang

Abstract:

Cloud virtualization technologies are becoming more and more prevalent, cloud users usually encounter the problem of how to access to the virtualized remote desktops easily over the web without requiring the installation of special clients. To resolve this issue, we took advantage of the HTML5 technology and developed web-based remote desktop. It permits users to access the terminal which running in our cloud platform from anywhere. We implemented a sketch of web interface following the cloud computing concept that seeks to enable collaboration and communication among users for high performance computing. Given the development of remote desktop virtualization, it allows to shift the user’s desktop from the traditional PC environment to the cloud platform, which is stored on a remote virtual machine rather than locally. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for online cloud service. This is also made possible by the low administrative costs as well as relatively inexpensive end-user terminals and reduced energy expenses.

Keywords: virtualization, remote desktop, HTML5, cloud computing

Procedia PDF Downloads 339
555 Filtering Intrusion Detection Alarms Using Ant Clustering Approach

Authors: Ghodhbani Salah, Jemili Farah

Abstract:

With the growth of cyber attacks, information safety has become an important issue all over the world. Many firms rely on security technologies such as intrusion detection systems (IDSs) to manage information technology security risks. IDSs are considered to be the last line of defense to secure a network and play a very important role in detecting large number of attacks. However the main problem with today’s most popular commercial IDSs is generating high volume of alerts and huge number of false positives. This drawback has become the main motivation for many research papers in IDS area. Hence, in this paper we present a data mining technique to assist network administrators to analyze and reduce false positive alarms that are produced by an IDS and increase detection accuracy. Our data mining technique is unsupervised clustering method based on hybrid ANT algorithm. This algorithm discovers clusters of intruders’ behavior without prior knowledge of a possible number of classes, then we apply K-means algorithm to improve the convergence of the ANT clustering. Experimental results on real dataset show that our proposed approach is efficient with high detection rate and low false alarm rate.

Keywords: intrusion detection system, alarm filtering, ANT class, ant clustering, intruders’ behaviors, false alarms

Procedia PDF Downloads 404
554 The Use of Biofeedback to Increase Resilience and Mental Health of Supersonic Pilots

Authors: G. Kloudova, S. Kozlova, M. Stehlik

Abstract:

Pilots are operating in a high-risk environment rich in potential stressors, which negatively affect aviation safety and the mental health of pilots. In the research conducted, the pilots were offered mental training biofeedback therapy. Biofeedback is an objective tool to measure physiological responses to stress. After only six sessions, all of the pilots tested showed significant differences between their initial condition and their condition after therapy. The biggest improvement was found in decreased heart rate (in 83.3% of tested pilots) and respiration rate (66.7%), which are the best indicators of anxiety states and panic attacks. To incorporate all of the variables, we correlated the measured physiological state of the pilots with their personality traits. Surprisingly, we found a high correlation with peripheral temperature and confidence (0.98) and with heart rate and aggressiveness (0.97). A retest made after a one-year interval showed that in majority of the subjects tested their acquired self-regulation ability had been internalized.

Keywords: aviation, biofeedback, mental workload, performance psychology

Procedia PDF Downloads 250
553 A Framework for Event-Based Monitoring of Business Processes in the Supply Chain Management of Industry 4.0

Authors: Johannes Atug, Andreas Radke, Mitchell Tseng, Gunther Reinhart

Abstract:

In modern supply chains, large numbers of SKU (Stock-Keeping-Unit) need to be timely managed, and any delays in noticing disruptions of items often limit the ability to defer the impact on customer order fulfillment. However, in supply chains of IoT-connected enterprises, the ERP (Enterprise-Resource-Planning), the MES (Manufacturing-Execution-System) and the SCADA (Supervisory-Control-and-Data-Acquisition) systems generate large amounts of data, which generally glean much earlier notice of deviations in the business process steps. That is, analyzing these streams of data with process mining techniques allows the monitoring of the supply chain business processes and thus identification of items that deviate from the standard order fulfillment process. In this paper, a framework to enable event-based SCM (Supply-Chain-Management) processes including an overview of core enabling technologies are presented, which is based on the RAMI (Reference-Architecture-Model for Industrie 4.0) architecture. The application of this framework in the industry is presented, and implications for SCM in industry 4.0 and further research are outlined.

Keywords: cyber-physical production systems, event-based monitoring, supply chain management, RAMI (Reference-Architecture-Model for Industrie 4.0)

Procedia PDF Downloads 237
552 A Review on Factors Influencing Implementation of Secure Software Development Practices

Authors: Sri Lakshmi Kanniah, Mohd Naz’ri Mahrin

Abstract:

More and more businesses and services are depending on software to run their daily operations and business services. At the same time, cyber-attacks are becoming more covert and sophisticated, posing threats to software. Vulnerabilities exist in the software due to the lack of security practices during the phases of software development. Implementation of secure software development practices can improve the resistance to attacks. Many methods, models and standards for secure software development have been developed. However, despite the efforts, they still come up against difficulties in their deployment and the processes are not institutionalized. There is a set of factors that influence the successful deployment of secure software development processes. In this study, the methodology and results from a systematic literature review of factors influencing the implementation of secure software development practices is described. A total of 44 primary studies were analysed as a result of the systematic review. As a result of the study, a list of twenty factors has been identified. Some of factors that affect implementation of secure software development practices are: Involvement of the security expert, integration between security and development team, developer’s skill and expertise, development time and communication between stakeholders. The factors were further classified into four categories which are institutional context, people and action, project content and system development process. The results obtained show that it is important to take into account organizational, technical and people issues in order to implement secure software development initiatives.

Keywords: secure software development, software development, software security, systematic literature review

Procedia PDF Downloads 381
551 The Walkway Project: An Exploration of Informal Public Space Upgrading in Gugulethu, Cape Town

Authors: Kathryn Ewing

Abstract:

Safe and accessible public spaces are vital elements of our South African cities. Public spaces hold the potential to act as important, vibrant places for learning, exchange, and practice. Public walkways, however, are some of the most neglected and extremely dangerous public spaces experienced in the local neighborhood of Gugulethu in Cape Town. Walkways feel insignificant, being recognized as informal and undetermined or retain complex fragments of formal erven. They are generally out of sight connecting minor streets and informal settlements. Community residents refer to the walkways as unsafe and dirty spaces. Local authorities allocate minimal to no municipal budgets nor maintenance plans resulting in a lack of basic services, particularly lighting and green infrastructure. ‘The Walkway Project’ presents a series of urban stories collected from co-design workshops, emotional mapping exercises, and fieldwork, including urban walks and urban talks. The narrative interprets the socio-spatial practice and complexity of informal public space in Gugulethu, Cape Town. The Walkway Project research, interrelated to the Master of Urban Design teaching and design-research studio, has a strong focus on participatory and engaged learning and action research methodology within a deliberate pedagogy. A consolidated urban design implementation plan exposes the impact and challenges of waste and water, opening the debate on relevant local solutions for resilience and safety in Cape Town. A small and neglected passage connecting two streets, commonly referred to as iThemba Walkway, is presented as a case study to show-case strategic urban design intervention strategies for urban upgrading. The iThemba walkway is a community-driven project that demonstrates active and responsible co-design and participatory development opportunities. In March 2021, when visited on an urban walk, the public space was covered by rubble and solid waste. By April 2021, the community cleaned the walkway and created an accessible passage for the school children to pass. Numerous co-design workshops have taken place over the past year. The walkway has emerged as a public space upgrading project facilitated, motivated, and implemented by multiple local partners and residents. Social maps from urban walks and talks illustrate the transformation of iThemba Walkway into an inclusive, safe, resilient, and sustainable urban space, linked to Sustainable Development Goal number 11, sustainable cities and communities. The outcomes of the upgrading project facilitate a deeper understanding of co-design methods, urban upgrading processes, and monitoring of public space and informal urbanism.

Keywords: informal, public space, resilience, safety, upgrade, walkways

Procedia PDF Downloads 95
550 Importance of Remote Sensing and Information Communication Technology to Improve Climate Resilience in Low Land of Ethiopia

Authors: Hasen Keder Edris, Ryuji Matsunaga, Toshi Yamanaka

Abstract:

The issue of climate change and its impact is a major contemporary global concern. Ethiopia is one of the countries experiencing adverse climate change impact including frequent extreme weather events that are exacerbating drought and water scarcity. Due to this reason, the government of Ethiopia develops a strategic document which focuses on the climate resilience green economy. One of the major components of the strategic framework is designed to improve community adaptation capacity and mitigation of drought. For effective implementation of the strategy, identification of regions relative vulnerability to drought is vital. There is a growing tendency of applying Geographic Information System (GIS) and Remote Sensing technologies for collecting information on duration and severity of drought by direct measure of the topography as well as an indirect measure of land cover. This study aims to show an application of remote sensing technology and GIS for developing drought vulnerability index by taking lowland of Ethiopia as a case study. In addition, it assesses integrated Information Communication Technology (ICT) potential of Ethiopia lowland and proposes integrated solution. Satellite data is used to detect the beginning of the drought. The severity of drought risk prone areas of livestock keeping pastoral is analyzed through normalized difference vegetation index (NDVI) and ten years rainfall data. The change from the existing and average SPOT NDVI and vegetation condition index is used to identify the onset of drought and potential risks. Secondary data is used to analyze geographical coverage of mobile and internet usage in the region. For decades, the government of Ethiopia introduced some technologies and approach to overcoming climate change related problems. However, lack of access to information and inadequate technical support for the pastoral area remains a major challenge. In conventional business as usual approach, the lowland pastorals continue facing a number of challenges. The result indicated that 80% of the region face frequent drought occurrence and out of this 60% of pastoral area faces high drought risk. On the other hand, the target area mobile phone and internet coverage is rapidly growing. One of identified ICT solution enabler technology is telecom center which covers 98% of the region. It was possible to identify the frequently affected area and potential drought risk using the NDVI remote-sensing data analyses. We also found that ICT can play an important role in mitigating climate change challenge. Hence, there is a need to strengthen implementation efforts of climate change adaptation through integrated Remote Sensing and web based information dissemination and mobile alert of extreme events.

Keywords: climate changes, ICT, pastoral, remote sensing

Procedia PDF Downloads 317
549 Design of an Ensemble Learning Behavior Anomaly Detection Framework

Authors: Abdoulaye Diop, Nahid Emad, Thierry Winter, Mohamed Hilia

Abstract:

Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy.

Keywords: cybersecurity, data protection, access control, insider threat, user behavior analysis, ensemble learning, high performance computing

Procedia PDF Downloads 128
548 The Impact of Cybercrime on Youth Development in Nigeria

Authors: Christiana Ebobo

Abstract:

Cybercrime consists of numerous crimes that are perpetrated on the internet on daily basis. The forms include but not limited to Identity theft, Pretentious dating, Desktop counterfeiting, Internet chat room, Cyber harassment, Fraudulent electronic mails, Automated Teller Machine Spoofing, Pornography, Piracy, Hacking, Credit card frauds, Phishing and Spamming. The general term used among the youths for this type of crime in Nigeria is ‘Yahoo Yahoo’. Cybercrime is on the increase among the youths at all levels as such this study aims at examining the impact of cybercrime on youth development in Nigeria. The study examines the impact of cybercrime on youths’ academic performance, integrity, employment and religious practices. The study is a survey which made use of questionnaire and focus group discussion among 150 randomly selected youths in Gwagwalada LCDA, Federal Capital Territory, Nigeria. The study adopts the systems theory as its theoretical framework. The study also adopts the simple frequency table and percentage for its data analysis. The study reveals that cybercrime has eaten deep into the minds of some youths and some of them are practicing diabolic means to succeed in it. It is also reveals that majority (68%) of the respondents believe that cybercrime impacts negatively on youths’ academic performance in Nigeria. The major recommendation of this study is that cybercrime offenders should be treated like armed robbers in order to discourage other youths from getting involved in it.

Keywords: armed robber, cybercrime, integrity, youth

Procedia PDF Downloads 528
547 Urban Landscape Sustainability Between Past and Present: Toward a Future Vision

Authors: Dina Salem

Abstract:

A variety of definitions and interpretations for sustainable development has been offered since the widely known definition of the World Commission on Environment and Development in 1987, the perspectives have ranged from deep ecology to better life quality for people. Sustainable landscape is widely understood as a key contributor to urban sustainability for the fact that all landscapes has a social, economic, cultural and ecological function for the community’s well-being and urban development, that was evident even before the emergence of sustainability concept. In this paper, the concepts of landscape planning and sustainable development are briefly reviewed; visions for landscape sustainability are demonstrated and classified. Challenges facing sustainable landscape planning are discussed. Finally, the paper investigates how our future urban open space could be sustainable and how does this contribute to urban sustainability, by creating urban landscapes that takes into account the social and cultural values of users of urban open space besides the ecological balance of urban open spaces as an integrated network.

Keywords: urban landscape, urban sustainability, resilience, open spaces

Procedia PDF Downloads 551
546 A Dynamic Column Adsorption Study of Methyl Blue on Synthesis onto Synthesized Chitosan Immobilized Sawdust Cellulose Nanocrystals

Authors: Opeyemi A. Oyewo, Seshibe Makgato

Abstract:

This paper presents the synthesis, characterization, and application of pelletized chitosan immobilized sawdust cellulose nanocrystals (PCCN) in a fixed-bed column for the continuous adsorption of methyl blue (MB) from water. The product was characterized using FT-IR, XRD, and SEM analysis. Microstructural examination revealed that the pellets are porous and spherical. XRD examination revealed phases that can be attributed to the presence of chitosan in PCCN. The effects of starting concentration, bed depth, and flow rate on synthetic water were explored. To identify MB breakthrough behaviour, performance indices such as bed volume, adsorbent exhaustion rate, and service time were investigated. Furthermore, the breakthrough data were incorporated into both the Thomas and Bohart-Adams models. The Thomas model was suitable for describing MB breakthrough curves. However, more research with diverse water matrices may be required to assess the resilience of PCCN.

Keywords: adsorption, dynamic, methyl blue, pelletization

Procedia PDF Downloads 35
545 A Qualitative Study About a Former Professional Baseball Player with Dyslexia

Authors: Matthias Grunke

Abstract:

In this qualitative study, we interviewed a young man with learning disabilities who played professional baseball for two years. Individuals with severe academic challenges constitute one of the most vulnerable groups of our society. Science has to find ways on how to arm them against life’s challenges and help them to cope with the many risk factors that they are usually confronted with. Team sports like baseball seem to be a suitable means for that purpose. In the interview, our participant talked about his life as a student with severe learning difficulties and related how his career in baseball made his academic challenges appear much less significant. He gave some meaningful insights into what helped him to build a happy and fulfilling life for himself, not only in spite of his challenges but also because of what he's learning disabilities taught him. Support from significant others, a sense of purpose, his fighting spirit ignited by sports, and the success that he experienced on the baseball field were among the most relevant factors. Overall, this study highlights the importance of finding an outlet for young people with learning disabilities where their academic difficulties retreat into the background and their talents are validated.

Keywords: baseball, inclusion, learning disabilities, resilience

Procedia PDF Downloads 97