Search results for: cyber threats
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 933

Search results for: cyber threats

213 BFDD-S: Big Data Framework to Detect and Mitigate DDoS Attack in SDN Network

Authors: Amirreza Fazely Hamedani, Muzzamil Aziz, Philipp Wieder, Ramin Yahyapour

Abstract:

Software-defined networking in recent years came into the sight of so many network designers as a successor to the traditional networking. Unlike traditional networks where control and data planes engage together within a single device in the network infrastructure such as switches and routers, the two planes are kept separated in software-defined networks (SDNs). All critical decisions about packet routing are made on the network controller, and the data level devices forward the packets based on these decisions. This type of network is vulnerable to DDoS attacks, degrading the overall functioning and performance of the network by continuously injecting the fake flows into it. This increases substantial burden on the controller side, and the result ultimately leads to the inaccessibility of the controller and the lack of network service to the legitimate users. Thus, the protection of this novel network architecture against denial of service attacks is essential. In the world of cybersecurity, attacks and new threats emerge every day. It is essential to have tools capable of managing and analyzing all this new information to detect possible attacks in real-time. These tools should provide a comprehensive solution to automatically detect, predict and prevent abnormalities in the network. Big data encompasses a wide range of studies, but it mainly refers to the massive amounts of structured and unstructured data that organizations deal with on a regular basis. On the other hand, it regards not only the volume of the data; but also that how data-driven information can be used to enhance decision-making processes, security, and the overall efficiency of a business. This paper presents an intelligent big data framework as a solution to handle illegitimate traffic burden on the SDN network created by the numerous DDoS attacks. The framework entails an efficient defence and monitoring mechanism against DDoS attacks by employing the state of the art machine learning techniques.

Keywords: apache spark, apache kafka, big data, DDoS attack, machine learning, SDN network

Procedia PDF Downloads 165
212 Building User Behavioral Models by Processing Web Logs and Clustering Mechanisms

Authors: Madhuka G. P. D. Udantha, Gihan V. Dias, Surangika Ranathunga

Abstract:

Today Websites contain very interesting applications. But there are only few methodologies to analyze User navigations through the Websites and formulating if the Website is put to correct use. The web logs are only used if some major attack or malfunctioning occurs. Web Logs contain lot interesting dealings on users in the system. Analyzing web logs has become a challenge due to the huge log volume. Finding interesting patterns is not as easy as it is due to size, distribution and importance of minor details of each log. Web logs contain very important data of user and site which are not been put to good use. Retrieving interesting information from logs gives an idea of what the users need, group users according to their various needs and improve site to build an effective and efficient site. The model we built is able to detect attacks or malfunctioning of the system and anomaly detection. Logs will be more complex as volume of traffic and the size and complexity of web site grows. Unsupervised techniques are used in this solution which is fully automated. Expert knowledge is only used in validation. In our approach first clean and purify the logs to bring them to a common platform with a standard format and structure. After cleaning module web session builder is executed. It outputs two files, Web Sessions file and Indexed URLs file. The Indexed URLs file contains the list of URLs accessed and their indices. Web Sessions file lists down the indices of each web session. Then DBSCAN and EM Algorithms are used iteratively and recursively to get the best clustering results of the web sessions. Using homogeneity, completeness, V-measure, intra and inter cluster distance and silhouette coefficient as parameters these algorithms self-evaluate themselves to input better parametric values to run the algorithms. If a cluster is found to be too large then micro-clustering is used. Using Cluster Signature Module the clusters are annotated with a unique signature called finger-print. In this module each cluster is fed to Associative Rule Learning Module. If it outputs confidence and support as value 1 for an access sequence it would be a potential signature for the cluster. Then the access sequence occurrences are checked in other clusters. If it is found to be unique for the cluster considered then the cluster is annotated with the signature. These signatures are used in anomaly detection, prevent cyber attacks, real-time dashboards that visualize users, accessing web pages, predict actions of users and various other applications in Finance, University Websites, News and Media Websites etc.

Keywords: anomaly detection, clustering, pattern recognition, web sessions

Procedia PDF Downloads 280
211 Towards a Reinvented Cash Management Function: Mobilising Innovative Advances for Enhanced Performance and Optimised Cost Management: Insights from Large Moroccan Companies in the Casablanca-Settat Region

Authors: Badrane Nohayla, Bamousse Zineb

Abstract:

Financial crises, exchange rate volatility, fluctuations in commodity prices, increased competitive pressures, and environmental issues are all threats that businesses face. In light of these diverse challenges, proactive, agile, and innovative cash management becomes an indispensable financial shield, allowing companies to thrive despite the adverse conditions of the global environment. In the same spirit, uncertainty, turbulence, volatility, and competitiveness continue to disrupt economic environments, compelling companies to swiftly master innovative breakthroughs that provide added value. In such a context, innovation emerges as a catalytic vector for performance, aiming to reduce costs, strengthen growth, and ultimately ensure the sustainability of Moroccan companies in the national arena. Moreover, innovation in treasury management promises to be one of the key pillars of financial stability, enabling companies to navigate the tumultuous waters of a globalized environment. Therefore, the objective of this study is to better understand the impact of innovative treasury management on cost optimization and, by extension, performance improvement. To elucidate this relationship, we conducted an exploratory qualitative study with 20 large Moroccan companies operating in the Casablanca-Settat region. The results highlight that innovation at the heart of treasury management is a guarantee of sustainability against the risks of failure and stands as a true pivot of the performance of Moroccan companies, an important parameter of their financial balance and a catalytic vector of their growth in the national economic landscape. In this regard, the present study aims to explore the extent to which innovation at the core of the treasury function serves as an indispensable tool for boosting performance while optimising costs in large Moroccan companies.

Keywords: innovative cash management, artificial intelligence, financial performance, risk management, cost savings

Procedia PDF Downloads 19
210 Climate Change Adaptation: Methodologies and Tools to Define Resilience Scenarios for Existing Buildings in Mediterranean Urban Areas

Authors: Francesca Nicolosi, Teresa Cosola

Abstract:

Climate changes in Mediterranean areas, such as the increase of average seasonal temperatures, the urban heat island phenomenon, the intensification of solar radiation and the extreme weather threats, cause disruption events, so that climate adaptation has become a pressing issue. Due to the strategic role that the built heritage holds in terms of environmental impact and energy waste and its potentiality, it is necessary to assess the vulnerability and the adaptive capacity of the existing building to climate change, in order to define different mitigation scenarios. The aim of this research work is to define an optimized and integrated methodology for the assessment of resilience levels and adaptation scenarios for existing buildings in Mediterranean urban areas. Moreover, the study of resilience indicators allows us to define building environmental and energy performance in order to identify the design and technological solutions for the improvement of the building and its urban area potentialities. The methodology identifies step-by-step different phases, starting from the detailed study of characteristic elements of urban system: climatic, natural, human, typological and functional components are analyzed in their critical factors and their potential. Through the individuation of the main perturbing factors and the vulnerability degree of the system to the risks linked to climate change, it is possible to define mitigation and adaptation scenarios. They can be different, according to the typological, functional and constructive features of the analyzed system, divided into categories of intervention, and characterized by different analysis levels (from the single building to the urban area). The use of software simulations allows obtaining information on the overall behavior of the building and the urban system, to generate predictive models in the medium and long-term environmental and energy retrofit and to make a comparative study of the mitigation scenarios identified. The studied methodology is validated on a case study.

Keywords: climate impact mitigation, energy efficiency, existing building heritage, resilience

Procedia PDF Downloads 236
209 The Application of Dynamic Network Process to Environment Planning Support Systems

Authors: Wann-Ming Wey

Abstract:

In recent years, in addition to face the external threats such as energy shortages and climate change, traffic congestion and environmental pollution have become anxious problems for many cities. Considering private automobile-oriented urban development had produced many negative environmental and social impacts, the transit-oriented development (TOD) has been considered as a sustainable urban model. TOD encourages public transport combined with friendly walking and cycling environment designs, however, non-motorized modes help improving human health, energy saving, and reducing carbon emissions. Due to environmental changes often affect the planners’ decision-making; this research applies dynamic network process (DNP) which includes the time dependent concept to promoting friendly walking and cycling environmental designs as an advanced planning support system for environment improvements. This research aims to discuss what kinds of design strategies can improve a friendly walking and cycling environment under TOD. First of all, we collate and analyze environment designing factors by reviewing the relevant literatures as well as divide into three aspects of “safety”, “convenience”, and “amenity” from fifteen environment designing factors. Furthermore, we utilize fuzzy Delphi Technique (FDT) expert questionnaire to filter out the more important designing criteria for the study case. Finally, we utilized DNP expert questionnaire to obtain the weights changes at different time points for each design criterion. Based on the changing trends of each criterion weight, we are able to develop appropriate designing strategies as the reference for planners to allocate resources in a dynamic environment. In order to illustrate the approach we propose in this research, Taipei city as one example has been used as an empirical study, and the results are in depth analyzed to explain the application of our proposed approach.

Keywords: environment planning support systems, walking and cycling, transit-oriented development (TOD), dynamic network process (DNP)

Procedia PDF Downloads 339
208 Dietary Exposure of Heavy Metals through Cereals Commonly Consumed by Dhaka City Residents

Authors: A. Md. Bayejid Hosen, B. M Zakir Hossain Howlader, C. Yearul Kabir

Abstract:

Contamination of soil and agricultural products by heavy metals resulting from rapid industrial development has caused major concern. Dietary exposure to heavy metals has been associated with toxic and adverse health effects. The main threats to human health from heavy metals are associated with exposure to Pb, Cd and Hg. The aim of this study was to monitor the presence of heavy metals in cereals collected from different wholesale markets of Dhaka City. One hundred and sixty cereal samples were collected and analyzed for determination of heavy metals. Heavy metals were analyzed by inductively coupled plasma mass spectrometry (ICP-MS). A total of six heavy metals– lead, chromium, cadmium, mercury, arsenic and antimony were estimated. The average concentrations of heavy metals in cereals fall within the safe limit established by regulatory organizations except for Pb (152.4 μg/100g) and Hg (15.13 μg/100g) which exceeded the safe limits. BARI gom-26 was the highest source of Pb (304.1 μg/100g) whereas Haski-29 rice variety contained the highest amount of Hg (60.85 μg/100g). Though all the cereal varieties contained approximately same amount of Cr the naizer sail varieties contained huge amount of Cr (171.8 μg/100g). Among all the cereal samples miniket rice varieties contained the least amount of heavy metals. The concentration of Cr (63.24 μg/100g), Cd (5.54 μg/100g) and As (3.26 μg/100g) in all cereals were below the safe limits. The daily intake of heavy metals was determined using the total weight of cereals consumed each day multiplied by the concentrations of heavy metals in cereals. The daily intake was compared with provisional maximum tolerable daily intake set by different regulatory organizations. The daily intake of Cd (23.0 μg), Hg (63.0 μg) and as (13.6 μg) through cereals were below the risk level except for Pb (634.0 μg) and Cr (263.1 μg). As the main meal of average Bangladeshi people is boiled rice served with some sorts of vegetables, our findings indicate that the residents of Dhaka City are at risk from Pb and Cr contamination. Potential health risks from exposure to heavy metals in self-planted cereals need more attention.

Keywords: contamination, dietary exposure, heavy metals, human health, ICP-MS

Procedia PDF Downloads 442
207 A Model of Human Security: A Comparison of Vulnerabilities and Timespace

Authors: Anders Troedsson

Abstract:

For us humans, risks are intimately linked to human vulnerabilities - where there is vulnerability, there is potentially insecurity, and risk. Reducing vulnerability through compensatory measures means increasing security and decreasing risk. The paper suggests that a meaningful way to approach the study of risks (including threats, assaults, crisis etc.), is to understand the vulnerabilities these external phenomena evoke in humans. As is argued, the basis of risk evaluation, as well as responses, is the more or less subjective perception by the individual person, or a group of persons, exposed to the external event or phenomena in question. This will be determined primarily by the vulnerability or vulnerabilities that the external factor are perceived to evoke. In this way, risk perception is primarily an inward dynamic, rather than an outward one. Therefore, a route towards an understanding of the perception of risks, is a closer scrutiny of the vulnerabilities which they can evoke, thereby approaching an understanding of what in the paper is called the essence of risk (including threat, assault etc.), or that which a certain perceived risk means to an individual or group of individuals. As a necessary basis for gauging the wide spectrum of potential risks and their meaning, the paper proposes a model of human vulnerabilities, drawing from i.a. a long tradition of needs theory. In order to account for the subjectivity factor, which mediates between the innate vulnerabilities on the one hand, and the event or phenomenon out there on the other hand, an ensuing ontological discussion about the timespace characteristics of risk/threat/assault as perceived by humans leads to the positing of two dimensions. These two dimensions are applied on the vulnerabilities, resulting in a modelling effort featuring four realms of vulnerabilities which are related to each other and together represent a dynamic whole. In approaching the problem of risk perception, the paper thus defines the relevant realms of vulnerabilities, depicting them as a dynamic whole. With reference to a substantial body of literature and a growing international policy trend since the 1990s, this model is put in the language of human security - a concept relevant not only for international security studies and policy, but also for other academic disciplines and spheres of human endeavor.

Keywords: human security, timespace, vulnerabilities, risk perception

Procedia PDF Downloads 328
206 Climate Change and Health in Policies

Authors: Corinne Kowalski, Lea de Jong, Rainer Sauerborn, Niamh Herlihy, Anneliese Depoux, Jale Tosun

Abstract:

Climate change is considered one of the biggest threats to human health of the 21st century. The link between climate change and health has received relatively little attention in the media, in research and in policy-making. A long term and broad overview of how health is represented in the legislation on climate change is missing in the legislative literature. It is unknown if or how the argument for health is referred in legal clauses addressing climate change, in national and European legislation. Integrating scientific based evidence into policies regarding the impacts of climate change on health could be a key step to inciting the political and societal changes necessary to decelerate global warming. This may also drive the implementation of new strategies to mitigate the consequences on health systems. To provide an overview of this issue, we are analyzing the Global Climate Legislation Database provided by the Grantham Research Institute on Climate Change and the Environment. This institution was established in 2008 at the London School of Economics and Political Science. The database consists of (updated as of 1st January 2015) legislations on climate change in 99 countries around the world. This tool offers relevant information about the state of climate related policies. We will use the database to systematically analyze the 829 identified legislations to identify how health is represented as a relevant aspect of climate change legislation. We are conducting explorative research of national and supranational legislations and anticipate health to be addressed in various forms. The goal is to highlight how often, in what specific terms, which aspects of health or health risks of climate change are mentioned in various legislations. The position and recurrence of the mention of health is also of importance. Data will be extracted with complete quotation of the sentence which mentions health, which will allow for second qualitative stage to analyze which aspects of health are represented and in what context. This study is part of an interdisciplinary project called 4CHealth that confronts results of the research done on scientific, political and press literature to better understand how the knowledge on climate change and health circulates within those different fields and whether and how it is translated to real world change.

Keywords: climate change, explorative research, health, policies

Procedia PDF Downloads 358
205 Everyday Interactions among Imprisoned Sex Offenders: A Qualitative Study within the 'Due Palazzi' Prison in Padua

Authors: Matteo Mazzucato, Elena Faccio, Antonio Iudici

Abstract:

Prison is a social reality constructed by everyday interactions between an inmate, other social actors (cellmates, prison officers, educationalists and psychologists or other detainees) and the external world which participates in this complex construction through the social discourses on prison reality and its problems. Being a detainee means performing a self dealing with processes of stereotypization, attribution of a social role and prejudices assigned by various interlocutors and depending on what kind of crime one has been convicted of. Among all inmates, sex offenders are the ones who risk more to be socially condemned beyond a legal sentence since they have committed one of the most hated and disapproved crime. Regarding this, prison has to be considered as a critical context in which all community expectations and beliefs are converged: for common sense, rapists and child molesters are dangerous people who have to be stigmatized, punished and isolated. Furthermore, other detainees share a code of conduct by which the ‘sex offender’ is collocated at the lowest level of the social hierarchy of the prison. The penitentiary administration too defines this kind of detainee as a ‘vulnerable person to protect’ while prison staff considers him as a particular inmate who has to be treated and definitely changed. Considering all the complexities connected with being imprisoned as a sex offender, our research aimed at exploring how people convicted of sex crimes are called upon to manage all these hetero-narrations about their selves. Set this goal, textual data retrieved from this qualitative research show that sex offenders tend to not face the stigma assigned to them. They are rather used to minimize the story telling about their selves and costruct alternative biographies to be shared with other inmates. Managing narrations about their selves in this way permits to distance them from all the threats perceived living together with other detainees but it blocks sex offenders’ ri-signification of their offences during prison treatment. Given these results, prison administration should develop activities in order to create fields of interaction between detainees where experiencing new versions of their selves spendable even in external social situations. Regarding this it’s important to re-consider prison as part of the community and the sex offenders as a member of it.

Keywords: interactions, qualitative research, prison reality, sex offender

Procedia PDF Downloads 216
204 Exploring Sexual Behavior among Unmarried Male Youth in Bangladesh: A Cross-Sectional Study

Authors: Subas Chandra Biswas, Kazi Sameen Naser, Farzana Misha

Abstract:

Little is known about the sexual behavior of male youth, particularly unmarried young men in Bangladesh as most of the sexual and reproductive health and rights-related research and intervention are mainly focused on females and married couples. To understand the unmarried youth’s sexual behavior, data from a nationwide survey conducted in all 64 districts of Bangladesh were analyzed. Using multistage systematic random sampling, a survey was conducted among 11,113 male youth aged 15-24 years from May-August, 2019. This article analyzed and presented findings of the sexual behavior of unmarried respondents based on the data collected from 10,026 unmarried male youth. Findings showed that 18% had ever experience of sexual relationship, and the reported mean age of first sexual intercourse was 16.5years. For unmarried male youth, those who had a sexual experience, their first sexual partners were female friends/classmate (57%), female neighbors (16%), and female sex workers (12%), relatives (6%) and girlfriends with whom they had love relationship (4%). However, about 36% reported that they had a love relationship with girlfriends, and among them, 23% reported that they had sexual intercourse with their girlfriend. Those who had sexual relations with their girlfriend, 47% reported that they did not use the condom in their last sex with their girlfriend. Furthermore, 29% reported that they had sexual relationships with others besides their girlfriends. Other reported partners were female sex workers (32%), neighbors (29%), female friends (19%), relatives (12%), and cousins (5%). Also, 46% reported that they did not even use the condom during sex with other partners. About 9% used some sort of sexual stimulant to increase their libido. Among the respondents, 376 reported that they bought sex in the last six months, and the mean expenditure of buying sex for the respondent was 1,140 Taka (13.46 US Dollar). Though premarital sexual relations are not socially accepted, findings showed a large portion of male youth are engaged in these relationships and risky sexual behavior. Lack of awareness of sexual and reproductive health, unprotected sexual intercourse, use of the drug during sexual intercourse also increase the threats to health. Thus these findings are important to understand the sexual behavior of male youth in policy and programmatic implications. Therefore, to ensure a healthy sexual life and wellbeing, an immediate and culturally sensitive sexual health promotion intervention is needed for male youth in Bangladesh.

Keywords: Bangladesh, male youth, sexual and reproductive health, sexual behavior

Procedia PDF Downloads 136
203 Evidence of Microplastics Ingestion in Two Commercial Cephalopod Species: Octopus Vulgaris and Sepia Officinalis

Authors: Federica Laface, Cristina Pedà, Francesco Longo, Francesca de Domenico, Riccardo Minichino, Pierpaolo Consoli, Pietro Battaglia, Silvestro Greco, Teresa Romeo

Abstract:

Plastics pollution represents one of the most important threats to marine biodiversity. In the last decades, different species are investigated to evaluate the extent of the plastic ingestion phenomenon. Even if the cephalopods play an important role in the food chain, they are still poorly studied. The aim of this research was to investigate the plastic ingestion in two commercial cephalopod species from the southern Tyrrhenian Sea: the common octopus, Octopus vulgaris (n=6; mean mantle length ML 10.7 ± 1.8) and the common cuttlefish, Sepia officinalis (n=13; mean ML 13.2 ± 1.7). Plastics were extracted from the filters obtained by the chemical digestion of cephalopods gastrointestinal tracts (GITs), using 10% potassium hydroxide (KOH) solution in a 1:5 (w/v) ratio. Once isolated, particles were photographed, measured, and their size class, shape and color were recorded. A total of 81 items was isolated from 16 of the 19 examined GITs, representing a total occurrence (%O) of 84.2% with a mean value of 4.3 ± 8.6 particles per individual. In particular, 62 plastics were found in 6 specimens of O. vulgaris (%O=100) and 19 particles in 10 S. officinalis (%O=94.7). In both species, the microplastics size class was the most abundant (93.8%). Plastic items found in O. vulgaris were mainly fibers (61%) while fragments were the most frequent in S. officinalis (53%). Transparent was the most common color in both species. The analysis will be completed by Fourier transform infrared (FT-IR) spectroscopy technique in order to identify polymers nature. This study reports preliminary data on plastic ingestion events in two cephalopods species and represents the first record of plastic ingestion by the common octopus. Microplastic items detected in both common octopus and common cuttlefish could derive from secondary and/or accidental ingestion events, probably due to their behavior, feeding habits and anatomical features. Further studies will be required to assess the effect of marine litter pollution in these ecologically and commercially important species.

Keywords: cephalopods, GIT analysis, marine pollution, Mediterranean sea, microplastics

Procedia PDF Downloads 242
202 Nanotechnology in Construction as a Building Security

Authors: Hanan Fayez Hussein

Abstract:

‘Due to increasing environmental challenges and security problems in the world such as global warming, storms, and terrorism’, humans have discovered new technologies and new materials in order to program daily life. As providing physical and psychological security is one of the primary functions of architecture, so in order to provide security, building must prevents unauthorized entry and harm to occupant and reduce the threat of attack by making building less attractive targets by new technologies such as; Nanotechnology, which has emerged as a major science and technology focus of the 21st century and will be the next industrial revolution. Nanotechnology is control of the properties of matter, and it deals with structures of the size 100 nanometers or smaller in at least one dimension and has wide application in various fields. The construction and architecture sectors were among the first to be identified as a promising application area for nanotechnology. The advantages of using nanomaterials in construction are enormous, and promises heighten building security by utilizing the strength of building materials to make our buildings more secure and get smart home. Access barriers such as wall and windows could incorporate stronger materials benefiting from nano-reinforcement utilizing nanotubes and nano composites to act as protective cover. Carbon nanotubes, as one of nanotechnology application, can be designed up to 250 times stronger than steel. Nano-enabled devices and materials offer both enhanced and, in some cases, completely new defence systems. In the addition, the small amount of carbon nanoparticles to the construction materials such as; cement, concrete, wood, glass, gypson, and steel can make these materials act as defence elements. This paper highlights the fact that nanotechnology can impact the future global security and how building’s envelop can act as a defensive cover for the building and can be resistance to any threats can attack it. Then focus on its effect on construction materials such as; Concrete can obtain by nanoadditives excellent mechanical, chemical, and physical properties with less material, which can acts as a precautionary shield to the building.

Keywords: nanomaterial, global warming, building security, smart homes

Procedia PDF Downloads 73
201 Sustainability through Resilience: How Emergency Responders Cope with Stressors

Authors: Sophie Kroeling, Agnetha Schuchardt

Abstract:

Striving for sustainability brings a lot of challenges for different fields of interest, e. g. security or health concerns. In Germany, civil protection is predominantly carried out by emergency responders who perform essential tasks of civil protection. Based on theoretical concepts of different psychological stress theories this contribution focuses on the question, how the resilience of emergency responders can be improved. The goal is to identify resources and successful coping strategies that help to prevent and reduce negative outcomes during or after stressful events. The paper will present results from a qualitative analysis of semi-structured qualitative interviews with 20 emergency responders. These results provide insights into the complexity of coping processes (e. g. controlling the situation, downplaying perceived personal threats through humor) and show the diversity of stressors (like complexity of the disastrous situation, intrusive press and media, or lack of social support within the organization). Self-efficacy expectation was a very important resource for coping with stressful situations. The results served as a starting point for a quantitative survey (that was conducted in March 2017), the development of education and training tools for emergency responders and the improvement of critical incident stress management processes. First results from the quantitative study with more than 700 participants show that, e. g., the emergency responders use social coping within their private social network and also within their aid organization and that both are correlated to resilience. Moreover, missing information, bureaucratic problems and social conflicts within the organization are events that the majority of the participants considered very onerous. Further results from regression analysis will be presented. The proposed paper will combine findings from the qualitative study with the quantitative results, illustrating figures and correlations with respective statements from the interviews. At the end, suggestions for the improvement of the emergency responder’s resilience are given and it is discussed how this can make a contribution to strive for civil security and furthermore a sustainable development.

Keywords: civil security, emergency responders, stress, resilience, resources

Procedia PDF Downloads 139
200 Enhancing Robustness in Federated Learning through Decentralized Oracle Consensus and Adaptive Evaluation

Authors: Peiming Li

Abstract:

This paper presents an innovative blockchain-based approach to enhance the reliability and efficiency of federated learning systems. By integrating a decentralized oracle consensus mechanism into the federated learning framework, we address key challenges of data and model integrity. Our approach utilizes a network of redundant oracles, functioning as independent validators within an epoch-based training system in the federated learning model. In federated learning, data is decentralized, residing on various participants' devices. This scenario often leads to concerns about data integrity and model quality. Our solution employs blockchain technology to establish a transparent and tamper-proof environment, ensuring secure data sharing and aggregation. The decentralized oracles, a concept borrowed from blockchain systems, act as unbiased validators. They assess the contributions of each participant using a Hidden Markov Model (HMM), which is crucial for evaluating the consistency of participant inputs and safeguarding against model poisoning and malicious activities. Our methodology's distinct feature is its epoch-based training. An epoch here refers to a specific training phase where data is updated and assessed for quality and relevance. The redundant oracles work in concert to validate data updates during these epochs, enhancing the system's resilience to security threats and data corruption. The effectiveness of this system was tested using the Mnist dataset, a standard in machine learning for benchmarking. Results demonstrate that our blockchain-oriented federated learning approach significantly boosts system resilience, addressing the common challenges of federated environments. This paper aims to make these advanced concepts accessible, even to those with a limited background in blockchain or federated learning. We provide a foundational understanding of how blockchain technology can revolutionize data integrity in decentralized systems and explain the role of oracles in maintaining model accuracy and reliability.

Keywords: federated learning system, block chain, decentralized oracles, hidden markov model

Procedia PDF Downloads 55
199 Urban Sustainable Development with Flood Crisis Management Approach

Authors: Ali Liaghat, Navid Tavanpour, Nima Tavanpour

Abstract:

An increase in population and prevalence of urbanity have led plan makers and decision makers put effort into sustainable development of cities at national and local levels. One of the important issues in urban development is compliance with safety issues in cities. Despite natural disasters and unexpected events such as floods, earthquakes, hurricanes, fires, etc., urban development should be regarded as an axiom, or else any form of construction and development is not safe, because it will greatly harm economic growth and development and pose an obstacle to achieving sustainable development, plus a loss to lives and finances of people. Therefore, in line with urban development, it is necessary to identify particular environmental and local issues as determinants and pay attention to them at the top of everything, in that we can call it a good action and factor in urban sustainable developments. Physical structure of each city represents how it has developed or its development shaped and what incidents, changes, natural disasters it has undergone over time. Since any form of development plan should be in accordance with the previous situations of cities, disregarding it, unfortunately, can escalate into uncontrolled urban development, non-resistant and unstable construction against earthquake or invasion of river areas, destruction of agricultural lands or vegetation, periodic floods over time. It has been viewed as serious threats to developing cities, and typically caused destruction of bed and other urban facilities as well as damages to lives and finances. In addition, uncontrolled development has caused cities to look ugly in terms of urban façade, and off and on such unplanned measures caused the country to face countless losses, and it not only vitiates expenses incurred, but it will also impose additional costs of reconstruction, i.e. it is unsustainable development. Thus, in this paper, in addition to a discussion about necessity for a profound attitude toward this subject and making long-term plans, programs for organizing river and its surrounding area, creating open and green urban spaces, retrofitting and flood preventing are presented for sustainable safety and development of cities along with a critique of successful countries.

Keywords: flood, sustainable development, urbanisation, urban management

Procedia PDF Downloads 266
198 How Virtualization, Decentralization, and Network-Building Change the Manufacturing Landscape: An Industry 4.0 Perspective

Authors: Malte Brettel, Niklas Friederichsen, Michael Keller, Marius Rosenberg

Abstract:

The German manufacturing industry has to withstand an increasing global competition on product quality and production costs. As labor costs are high, several industries have suffered severely under the relocation of production facilities towards aspiring countries, which have managed to close the productivity and quality gap substantially. Established manufacturing companies have recognized that customers are not willing to pay large price premiums for incremental quality improvements. As a consequence, many companies from the German manufacturing industry adjust their production focusing on customized products and fast time to market. Leveraging the advantages of novel production strategies such as Agile Manufacturing and Mass Customization, manufacturing companies transform into integrated networks, in which companies unite their core competencies. Hereby, virtualization of the process- and supply-chain ensures smooth inter-company operations providing real-time access to relevant product and production information for all participating entities. Boundaries of companies deteriorate, as autonomous systems exchange data, gained by embedded systems throughout the entire value chain. By including Cyber-Physical-Systems, advanced communication between machines is tantamount to their dialogue with humans. The increasing utilization of information and communication technology allows digital engineering of products and production processes alike. Modular simulation and modeling techniques allow decentralized units to flexibly alter products and thereby enable rapid product innovation. The present article describes the developments of Industry 4.0 within the literature and reviews the associated research streams. Hereby, we analyze eight scientific journals with regards to the following research fields: Individualized production, end-to-end engineering in a virtual process chain and production networks. We employ cluster analysis to assign sub-topics into the respective research field. To assess the practical implications, we conducted face-to-face interviews with managers from the industry as well as from the consulting business using a structured interview guideline. The results reveal reasons for the adaption and refusal of Industry 4.0 practices from a managerial point of view. Our findings contribute to the upcoming research stream of Industry 4.0 and support decision-makers to assess their need for transformation towards Industry 4.0 practices.

Keywords: Industry 4.0., mass customization, production networks, virtual process-chain

Procedia PDF Downloads 270
197 Examining the Factors Impeding the Preservation of African Architectural Heritage

Authors: Okafor Calistus Chibuzor

Abstract:

Preserving African architectural heritage is a multifaceted endeavor that intersects with socio-cultural, economic, and environmental factors. Despite growing recognition of the importance of safeguarding these invaluable cultural assets, numerous challenges persist, hindering effective preservation efforts across the continent. This paper investigates the underlying factors impeding the preservation of African architectural heritage, aiming to provide insights for addressing this critical issue. The study begins with an exploration of the historical background and significance of African architectural heritage, highlighting its rich diversity and cultural significance. The study acknowledges that there is an urgent need to address the threats facing these heritage sites, including urbanization, rapid development, lack of funding, inadequate legal protection, and insufficient public awareness. The primary aim of this research is to identify and analyze the key factors contributing to the deterioration and loss of African architectural heritage, with the objective of formulating strategies to mitigate these challenges. A mixed-use research methodology combining archival research, field surveys, stakeholder interviews, and case studies is employed to gather comprehensive data and insights. The findings reveal a complex interplay of socio-economic, political, and institutional factors shaping the preservation landscape in Africa, including issues related to funding, governance, community engagement, and capacity building. The paper concludes by highlighting the urgent need for coordinated efforts among government agencies, heritage organizations, local communities, and international stakeholders to address the identified challenges and develop sustainable preservation strategies. Recommendations are provided for enhancing legal frameworks, promoting community involvement, fostering public awareness, and mobilizing resources to safeguard Africa's rich architectural heritage for future generations.

Keywords: African architectural heritage, preservation challenges, preservation strategies, factors

Procedia PDF Downloads 50
196 Ethical 'Spaces': A Critical Analysis of the Medical, Ethical and Legal Complexities in the Treatment and Care of Unidentified and Critically Incapacitated Victims Following a Disaster

Authors: D. Osborn, L. Easthope

Abstract:

The increasing threat of ‘marauding terror,' utilising improvised explosive devices and firearms, has focused the attention of policy makers and emergency responders once again on the treatment of the critically injured patient in a highly volatile scenario. Whilst there have been significant improvements made in the response and lessons learned from recent disasters in the international disaster community there still remain areas of uncertainty and a lack of clarity in the care of the critically injured. This innovative, longitudinal study has at its heart the aim of using ethnographic methods to ‘slow down’ the journey such patients will take and make visible the ethical complexities that 2017 technologies, expectations and over a decade of improved combat medicine techniques have brought. The primary researcher, previously employed in the hospital emergency management environment, has closely followed responders as they managed casualties with life-threatening injuries. Ethnographic observation of Exercise Unified Response in March 2016, exposed the ethical and legal 'vacuums' within a mass casualty and fatality setting, specifically the extrication, treatment and care of critically injured patients from crushed and overturned train carriages. This article highlights a gap in the debate, evaluation, planning and response to an incident of this nature specifically the incapacitated, unidentified patients and the ethics of submitting them to the invasive ‘Disaster Victim Identification’ process. Using a qualitative ethnographic analysis, triangulating observation, interviews and documentation, this analysis explores the gaps and highlights the next stages in the researcher’s pathway as she continues to explore with emergency practitioners some of this century’s most difficult questions in relation to the medico-legal and ethical challenges faced by emergency services in the wake of new and emerging threats and medical treatment expectations.

Keywords: ethics, disaster, Disaster Victim Identification (DVI), legality, unidentified

Procedia PDF Downloads 187
195 Building Climate Resilience in the Health Sector in Developing Countries: Experience from Tanzania

Authors: Hussein Lujuo Mohamed

Abstract:

Introduction: Public health has always been influenced by climate and weather. Changes in climate and climate variability, particularly changes in weather extremes affect the environment that provides people with clean air, food, water, shelter, and security. Tanzania is not an exception to the threats of climate change. The health sector is mostly affected due to emergence and proliferation of infectious diseases, thereby affecting health of the population and thus impacting achievement of sustainable development goals. Methodology: A desk review on documented issues pertaining to climate change and health in Tanzania was done using Google search engine. Keywords included climate change, link, health, climate initiatives. In cases where information was not available, documents from Ministry of Health, Vice Presidents Office-Environment, Local Government Authority, Ministry of Water, WHO, research, and training institutions were reviewed. Some of the reviewed documents from these institutions include policy brief papers, fieldwork activity reports, training manuals, and guidelines. Results: Six main climate resilience activities were identified in Tanzania. These were development and implementation of climate resilient water safety plans guidelines both for rural and urban water authorities, capacity building of rural and urban water authorities on implementation of climate-resilient water safety plans, and capacity strengthening of local environmental health practitioners on mainstreaming climate change and health into comprehensive council health plans. Others were vulnerability and adaptation assessment for the health sector, mainstreaming climate change in the National Health Policy, and development of risk communication strategy on climate. In addition information, education, and communication materials on climate change and to create awareness were developed aiming to sensitize and create awareness among communities on climate change issues and its effect on public health. Conclusion: Proper implementation of these interventions will help the country become resilient to many impacts of climate change in the health sector and become a good example for other least developed countries.

Keywords: climate, change, Tanzania, health

Procedia PDF Downloads 113
194 Geospatial Analysis for Predicting Sinkhole Susceptibility in Greene County, Missouri

Authors: Shishay Kidanu, Abdullah Alhaj

Abstract:

Sinkholes in the karst terrain of Greene County, Missouri, pose significant geohazards, imposing challenges on construction and infrastructure development, with potential threats to lives and property. To address these issues, understanding the influencing factors and modeling sinkhole susceptibility is crucial for effective mitigation through strategic changes in land use planning and practices. This study utilizes geographic information system (GIS) software to collect and process diverse data, including topographic, geologic, hydrogeologic, and anthropogenic information. Nine key sinkhole influencing factors, ranging from slope characteristics to proximity to geological structures, were carefully analyzed. The Frequency Ratio method establishes relationships between attribute classes of these factors and sinkhole events, deriving class weights to indicate their relative importance. Weighted integration of these factors is accomplished using the Analytic Hierarchy Process (AHP) and the Weighted Linear Combination (WLC) method in a GIS environment, resulting in a comprehensive sinkhole susceptibility index (SSI) model for the study area. Employing Jenk's natural break classifier method, the SSI values are categorized into five distinct sinkhole susceptibility zones: very low, low, moderate, high, and very high. Validation of the model, conducted through the Area Under Curve (AUC) and Sinkhole Density Index (SDI) methods, demonstrates a robust correlation with sinkhole inventory data. The prediction rate curve yields an AUC value of 74%, indicating a 74% validation accuracy. The SDI result further supports the success of the sinkhole susceptibility model. This model offers reliable predictions for the future distribution of sinkholes, providing valuable insights for planners and engineers in the formulation of development plans and land-use strategies. Its application extends to enhancing preparedness and minimizing the impact of sinkhole-related geohazards on both infrastructure and the community.

Keywords: sinkhole, GIS, analytical hierarchy process, frequency ratio, susceptibility, Missouri

Procedia PDF Downloads 69
193 The Constitutional Rights of a Child to a Clean and Healthy Environment: A Case Study in the Vaal Triangle Region

Authors: Christiena Van Der Bank, Marjone Van Der Bank, Ronelle Prinsloo

Abstract:

The constitutional right to a healthy environment and the constitutional duty imposed on the state actively to protect the environment fulfill the specific duties to prevent pollution and ecological degradation and to promote conservation. The aim of this paper is to draw attention to the relationship between child rights and the environment. The focus is to analyse government’s responses as mandated with section 24 of the Bill of Rights for ensuring the right to a clean and healthy environment. The principle of sustainability of the environment encompasses the notion of equity and the harm to the environment affects the present as well as future generations. Section 24 obliges the state to ensure that the legacy of future generations is protected, an obligation that has been said to be part of the common law. The environment is an elusive and wide concept that can mean different things to different people depending on the context in which it is used for example clean drinking water or safe food. An extensive interpretation of the term environment would include almost everything that may positively or negatively influence the quality of human life. The analysis will include assessing policy measures, legislation, budgetary measures and other measures taken by the government in order to progressively meet its constitutional obligation. The opportunity of the child to grow up in a healthy and safe environment is extremely unjustly distributed. Without a realignment of political, legal and economic conditions this situation will not fundamentally change. South Africa as a developing country that needs to meet the demand of social transformation and economic growth whilst at the same time expediting its ability to compete in global markets, the country will inevitably embark on developmental programmes as a measure for sustainable development. The courts would have to inquire into the reasonableness of those measures. Environmental threats to children’s rights must be identified, taking into account children’s specific needs and vulnerabilities, their dependence and marginalisation. Obligations of states and violations of rights must be made more visible to the general public.

Keywords: environment, children rights, pollution, healthy, violation

Procedia PDF Downloads 167
192 A Research Study of the Inclusiveness of VR Headsets for Higher Education

Authors: Fredrick Forster, Gareth Ward, Matthew Tubby, Pamela Lithgow, Anne Nortcliffe

Abstract:

This paper presents the results from a research study of random adult participants accessing one of four different commercially available Virtual Reality (VR) Head Mounted Displays (HMDs) and completing a post user experience reflection questionnaire. The research sort to understand how inclusive commercially available VR HMDs are and identify any associated barriers that could impact the widespread adoption of the devices, specifically in Higher Education (HE). In the UK, education providers are legally required under the Equality Act 2010 to ensure all education facilities are inclusive and reasonable adjustments can be applied appropriately. The research specifically aimed to identify the considerations that academics and learning technologists need to make when adopting the use of commercial VR HMDs in HE classrooms, namely cybersickness, user comfort, Interpupillary Distance, inclusiveness, and user perceptions of VR. The research approach was designed to build upon previously published research on user reflections on presence, usability, and overall HMD comfort, using quantitative and qualitative research methods by way of a questionnaire. The quantitative data included the recording of physical characteristics such as the distance between eye pupils, known as Interpupillary Distance (IPD). VR HMDs require each user’s IPD measurement to enable the focusing of the VR HMDs virtual camera output to the right position in front of the eyes of the user. In addition, the questionnaire captured users’ qualitative reflections and evaluations of the broader accessibility characteristics of the VR HMDs. The initial research activity was accomplished by enabling a random sample of visitors, staff, and students at Canterbury Christ Church University, Kent to use a VR HMD for a set period of time and asking them to complete the post user experience questionnaire. The study identified that there is little correlation between users who experience cyber sickness and car sickness. Also, users with a smaller IPD than average (typically associated with females) were able to use the VR HMDs successfully; however, users with a larger than average IPD reported an impeded experience. This indicates that there is reduced inclusiveness for the tested VR HMDs for users with a higher-than-average IPD which is typically associated with males of certain ethnicities. As action education research, these initial findings will be used to refine the research method and conduct further investigations with the aim to provide verification and validation of the accessibility of current commercial VR HMDs. The conference presentation will report on the research results of the initial study and subsequent follow up studies with a larger variety of adult volunteers.

Keywords: virtual reality, education technology, inclusive technology, higher education

Procedia PDF Downloads 63
191 Well-being of Lagos Urban Mini-bus Drivers: The Influence of Age and Marital Status

Authors: Bolajoko I. Malomo, Maryam O. Yusuf

Abstract:

Lagos urban mini-bus drivers play a critical role in the transportation sector. The current major mode of transportation within Lagos metropolis remains road transportation and this confirms the relevance of urban mini-bus drivers in transporting the populace to their various destinations. Other modes of transportation such as the train and waterways are currently inadequate. Various threats to the well-being of urban bus drivers include congested traffic typical of modern day lifestyles, dwindling financial returns due to long hours in traffic, fewer hours of sleep, inadequate diet, time pressure, and assaults related to fare disputes. Several health-related problems have been documented to be associated with urban bus driving. For instance, greater rates of hypertension, obesity and cholesterol level has been reported. Research studies are yet to identify the influence of age and marital status on the well-being of urban mini-bus drivers in Lagos metropolis. A study of this nature is necessary as it is culturally perceived in Nigeria that older and married people are especially influenced by family affiliation and would behave in ways that would project positive outcomes. The study sample consisted of 150 urban mini-bus drivers who were conveniently sampled from six (6) different terminuses where their journey begins and terminates. The well-being questionnaire was administered to participants. The criteria for inclusion in the study included the ability to read in English language and the confirmation that interested participants were on duty and suited to be driving mini-buses. Due to the nature of the job of bus driving, the researcher administered the questionnaires on participants who were free and willing to respond to the survey. All participants were males of various age groups and of different marital statuses. Results of analyses conducted revealed no significant influence of age and marital status on the well-being of urban mini-bus drivers. This indicates that the well-being of urban mini-bus drivers is not influenced by age nor marital status. The findings of this study have cultural implications. It negates the popularly held belief that older and married people care more about their well-being than younger and single people. It brings to fore the need to also identify and consider other factors when certifying people for the job of urban bus driving.

Keywords: age, Lagos metropolis, marital status, well-being of urban mini bus drivers

Procedia PDF Downloads 427
190 Critical Analysis of International Protections for Children from Sexual Abuse and Examination of Indian Legal Approach

Authors: Ankita Singh

Abstract:

Sex trafficking and child pornography are those kinds of borderless crimes which can not be effectively prevented only through the laws and efforts of one country because it requires a proper and smooth collaboration among countries. Eradication of international human trafficking syndicates, criminalisation of international cyber offenders, and effective ban on child pornography is not possible without applying effective universal laws; hence, continuous collaboration of all countries is much needed to adopt and routinely update these universal laws. Congregation of countries on an international platform is very necessary from time to time, where they can simultaneously adopt international agendas and create powerful universal laws to prevent sex trafficking and child pornography in this modern digital era. In the past, some international steps have been taken through The Convention on the Rights of the Child (CRC) and through The Optional Protocol to the Convention on the Rights of the Child on the Sale of Children, Child Prostitution, and Child Pornography, but in reality, these measures are quite weak and are not capable in effectively protecting children from sexual abuse in this modern & highly advanced digital era. The uncontrolled growth of artificial intelligence (AI) and its misuse, lack of proper legal jurisdiction over foreign child abusers and difficulties in their extradition, improper control over international trade of digital child pornographic content, etc., are some prominent issues which can only be controlled through some new, effective and powerful universal laws. Due to a lack of effective international standards and a lack of improper collaboration among countries, Indian laws are also not capable of taking effective actions against child abusers. This research will be conducted through both doctrinal as well as empirical methods. Various literary sources will be examined, and a questionnaire survey will be conducted to analyse the effectiveness of international standards and Indian laws against child pornography. Participants in this survey will be Indian University students. In this work, the existing international norms made for protecting children from sexual abuse will be critically analysed. It will explore why effective and strong collaboration between countries is required in modern times. It will be analysed whether existing international steps are enough to protect children from getting trafficked or being subjected to pornography, and if these steps are not found to be sufficient enough, then suggestions will be given on how international standards and protections can be made more effective and powerful in this digital era. The approach of India towards the existing international standards, the Indian laws to protect children from being subjected to pornography, and the contributions & capabilities of India in strengthening the international standards will also be analysed.

Keywords: child pornography, prevention of children from sexual offences act, the optional protocol to the convention on the rights of the child on the sale of children, child prostitution and child pornography, the convention on the rights of the child

Procedia PDF Downloads 36
189 The Gender Digital Divide in Education: The Case of Students from Rural Area from Republic of Moldova

Authors: Bărbuță Alina

Abstract:

The inter-causal relationship between social inequalities and the digital divide raises the relation issue of gender and information and communication technologies (ICT) - a key element in achieving sustainable development. In preparing generations as future digital citizens and for active socio-economic participation, ICT plays a key role in respecting gender equality. Although several studies over the years have shown that gender plays an important role in digital exclusion, in recent years, many studies with a focus on economically developed or developing countries identify an improvement in these aspects and a gap narrowing. By measuring students' digital competencies level, this paper aims to identify and analyse the existing gender digital inequalities among students. Our analyses are based on a sample of 1526 middle school students residing in rural areas from Republic of Moldova (54.2% girls, mean age 14,00, SD = 1.02). During the online survey they filled in a questionnaire adapted from the (yDSI) ”The Youth Digital Skills Indicator”. The instrument measures the level of five digital competence areas indicated in The European Digital Competence Framework (DigiCom 2.3.). Our results, based on t-test, indicate that depending on gender, there are no statistically significant differences regarding the levels of digital skills in 3 areas: Information navigation and processing; Communication and interaction; Problem solving. However, were identified significant differences in the level of digital skills in the area of ”Digital content creation” [t(1425) = 4.20, p = .000] and ”Safety” [t(1421) = 2.49, p = .000], with higher scores recorded by girls. Our results contradicts the general stereotype regarding the low level of digital competence among girls, in our sample girls scores being on pear with boys and even bigger in knowledge related to digital content creation and online safety skills. Additional investigations related to boys competence on digital safety are necessary as the implication of their low scores on this dimension may suggest boys exposure to digital threats.

Keywords: digital divide, education, gender digital divide, digital literacy, remote learning

Procedia PDF Downloads 93
188 Spatial Distribution, Characteristics, and Pollution Risk Assessment of Microplastics in Sediments from Karnaphuli River Estuary, Bangladesh

Authors: Md. Refat Jahan Rakiba, M. Belal Hossaina, Rakesh Kumarc, Md. Akram Ullaha, Sultan Al Nahiand, Nazmun Naher Rimaa, Tasrina Rabia Choudhury, Samia Islam Libaf, Jimmy Yub, Mayeen Uddin Khandakerg, Abdelmoneim Suliemanh, Mohamed Mahmoud Sayedi

Abstract:

Microplastics (MPs) have become an emerging global pollutant due to their wide spread and dispersion and potential threats to marine ecosystems. However, studies on MPs of estuarine and coastal ecosystems of Bangladesh are very limited or not available. In this study, we conducted the first study on the abundance, distribution, characteristics and potential risk assessment of microplastics in the sediment of Karnaphuli River estuary, Bangladesh. Microplastic particles were extracted from sediments of 30 stations along the estuary by density separation, and then enumerated and characterize by using steromicroscope and Fourier Transform Infrared (FT-IR) spectroscopy. In the collected sediment, the number of MPs varied from 22.29 - 59.5 items kg−1 of dry weight (DW) with an average of 1177 particles kg−1 DW. The mean abundance was higher in the downstream and left bank of estuary where the predominant shape, colour, and size of MPs were films (35%), white (19%), and >5000 μm (19%), respectively. The main polymer types were polyethylene terephthalate, polystyrene, polyethylene, cellulose, and nylon. MPs were found to pose risks (low to high) in the sediment of the estuary, with the highest risk occuring at one station near a sewage outlet, according to the results of risk analyses using the pollution risk index (PRI), polymer risk index (H), contamination factors (CFs), and pollution load index (PLI). The single value index, PLI clearly demonastated that all sampling sites were considerably polluted (as PLI >1) with microplastics. H values showed toxic polymers even in lower proportions possess higher polymeric hazard scores and vice versa. This investigation uncovered new insights on the status of MPs in the sediments of Karnaphuli River estuary, laying the groundwork for future research and control of microplastic pollution and management.

Keywords: microplastics, polymers, pollution risk assessment, Karnaphuli esttuary

Procedia PDF Downloads 72
187 Moving Target Defense against Various Attack Models in Time Sensitive Networks

Authors: Johannes Günther

Abstract:

Time Sensitive Networking (TSN), standardized in the IEEE 802.1 standard, has been lent increasing attention in the context of mission critical systems. Such mission critical systems, e.g., in the automotive domain, aviation, industrial, and smart factory domain, are responsible for coordinating complex functionalities in real time. In many of these contexts, a reliable data exchange fulfilling hard time constraints and quality of service (QoS) conditions is of critical importance. TSN standards are able to provide guarantees for deterministic communication behaviour, which is in contrast to common best-effort approaches. Therefore, the superior QoS guarantees of TSN may aid in the development of new technologies, which rely on low latencies and specific bandwidth demands being fulfilled. TSN extends existing Ethernet protocols with numerous standards, providing means for synchronization, management, and overall real-time focussed capabilities. These additional QoS guarantees, as well as management mechanisms, lead to an increased attack surface for potential malicious attackers. As TSN guarantees certain deadlines for priority traffic, an attacker may degrade the QoS by delaying a packet beyond its deadline or even execute a denial of service (DoS) attack if the delays lead to packets being dropped. However, thus far, security concerns have not played a major role in the design of such standards. Thus, while TSN does provide valuable additional characteristics to existing common Ethernet protocols, it leads to new attack vectors on networks and allows for a range of potential attacks. One answer to these security risks is to deploy defense mechanisms according to a moving target defense (MTD) strategy. The core idea relies on the reduction of the attackers' knowledge about the network. Typically, mission-critical systems suffer from an asymmetric disadvantage. DoS or QoS-degradation attacks may be preceded by long periods of reconnaissance, during which the attacker may learn about the network topology, its characteristics, traffic patterns, priorities, bandwidth demands, periodic characteristics on links and switches, and so on. Here, we implemented and tested several MTD-like defense strategies against different attacker models of varying capabilities and budgets, as well as collaborative attacks of multiple attackers within a network, all within the context of TSN networks. We modelled the networks and tested our defense strategies on an OMNET++ testbench, with networks of different sizes and topologies, ranging from a couple dozen hosts and switches to significantly larger set-ups.

Keywords: network security, time sensitive networking, moving target defense, cyber security

Procedia PDF Downloads 67
186 Techno-Functional Characteristics, Mineral Composition and Antioxidant Potential of Dietary Fiber Extracted by Sonication from Different Oat Cultivars (Avena sativa)

Authors: Muhammad Suhail Ibrahim, Muhammad Nadeem, Muhammad Sultan, Uzair Sajjad, Khalid Hamid, Tahir Mahmood Qureshi, Sadaf Javaria

Abstract:

Metabolic disorders, including hypertension, diabetes, cardiovascular disease etc., are major threats to public health and economy. Management and prevention of alarmingly increasing disorders have attracted researchers to explore natural barriers against these disorders. The objective of this study was to explore oats as a potential source of dietary fiber. Extraction of dietary was optimized by response surface methodology, and five indigenous oat cultivars, including SGD2011, Avon, SGD81, PD2LV65, and S2000, were also characterized for techno-functional characteristics, mineral composition and phytochemical quantification. These cultivars varied significantly (p < 0.05) for oil holding capacity, water saturation, and water holding capacity, respectively. SGD81 showed the highest oil-holding capacity, water-holding capacity, and water saturation due to the highest fraction of dietary fiber. The highest values of total phenolic contents, total flavonoid contents, total flavonol contents, 2, 2-Diphenyl-1-picrylhydrazyl radical scavenging activity, and anthocyanin were shown by SGD81, and SGD2011, respectively. All cultivars varied significantly (P<0.05) with respect to phytochemical quantification. Oat cultivars SGD81 and SGD2011 showed the best phenolic acid profile and can be effectively used as a source of nutraceuticals. Beyond the nutritional properties of oats, these also contribute and emerged as potential sources of dietary fiber and have gained attention as nutraceutical cereal crops. This approach offers oats as a natural means of dietary fiber to protect humans from alarmingly increasing metabolic disorders, and its extraction by sonication has made it a sustainable and eco-friendly strategy.

Keywords: oat cultivars, dietary fibers, mineral profile, antioxidant activity, color properties

Procedia PDF Downloads 27
185 The Influence of Wildlife Watching Experience on Tourists’ Connection to Wildlife Conservation Caring and Awareness

Authors: Fiffy Hanisdah Saikim, Bruce Prideaux

Abstract:

One of the aims of wildlife tourism is to educate visitors about the threats facing wildlife, in general, and the actions needed to protect the environment and maintain biodiversity. Annually, millions of tourists visit natural areas and zoos primarily to view flagship species such as rhinos and elephants. Venues rely on the inherent charisma of these species to increase visitation and anchor conservation efforts. Expected visitor outcomes from the use of flagships include raised levels of awareness and pro-conservation behaviors. However, the role of flagships in wildlife tourism has been criticized for not delivering conservation benefits for species of interest or biodiversity and producing negative site impacts. Furthermore, little is known about how the connection to a species influences conservation behaviors. This paper addresses this gap in knowledge by extending previous work exploring wildlife tourism to include the emotional connection formed with wildlife species and pro-conservation behaviors for individual species and biodiversity. This paper represents a substantial contribution to the field because (a) it incorporates the role of the experience in understanding how tourists connect with a species and how this connection influences pro-conservation behaviors; and (b) is the first attempt to operationalize Conservation Caring as a measure of tourists’ connection with a species. Existing studies have investigated how specific elements, such as interpretation or species’ morphology may influence programmatic goals or awareness. However, awareness is a poor measure of an emotional connection with an animal. Furthermore, there has not been work done to address the holistic nature of the wildlife viewing experience, and its subsequent influence on behaviors. Results based on the structural equation modelling, support the validity of Conservation Caring as a factor; the ability of wildlife tourism to influence Conservation Caring; and that this connection is a strong predictor of conservation awareness behaviors. These findings suggest wildlife tourism can deliver conservation outcomes. The studies in this paper also provide a valuable framework for structuring wildlife tourism experiences to align with flagship related conservation outcomes, and exploring a wider assemblage of species as potential flagships.

Keywords: wildlife tourism, conservation caring, conservation awareness, structural equation modelling

Procedia PDF Downloads 282
184 Behavior Adoption on Marine Habitat Conservation in Indonesia

Authors: Muhammad Yayat Afianto, Darmawan, Agung Putra Utama, Hari Kushardanto

Abstract:

Fish Forever, Rare’s innovative coastal fisheries program, combined community-based conservation management approach with spatial management to restore and protect Indonesia’s small-scale fisheries by establishing Fishing Managed Access Area. A ‘TURF-Reserve’ is a fishery management approach that positions fishers at the center of fisheries management, empowering them to take care of and make decisions about the future of their fishery. After two years of the program, social marketing campaigns succeeded in changing their behavior by adopting the new conservation behavior. The Pride-TURF-R campaigns developed an overarching hypothesis of impact that captured the knowledge, attitude and behavior changes needed to reduce threats and achieve conservation results. Rare help Batu Belah fishers to develop their group, developed with their roles, sustainable fisheries plan, and the budget plan. On 12th February 2017, the Head of Loka Kawasan Konservasi Perairan Nasional (LKKPN) which is a Technical Implementation Unit for National Marine Conservation Areas directly responsible to the Directorate General for Marine Spatial Management in the Ministry of Marine Affairs and Fisheries had signed a Partnership Agreement with the Head of Batu Belah Village to manage a TURF+Reserve area as wide as 909 hectares. The fishers group have been collecting the catch and submitting the report monthly, initiated the installation of the buoy markers for the No Take Zone, and formed the Pokmaswas (community-based surveillance group). Prior to this behavior adoption, they don’t have any fisheries data, no group of fishers, and they have still fishing inside the No Take Zone. This is really a new behavior adoption for them. This paper will show the process and success story of the social marketing campaign to conserve marine habitat in Anambas through Pride-TURF-R program.

Keywords: behavior adoption, community participation, no take zone, pride-TURF-R

Procedia PDF Downloads 261