Search results for: socially engineered attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1278

Search results for: socially engineered attacks

558 Mechanical Strengths of Self-Compacting Mortars Prepared with the Pozzolanic Cement in Aggressive Environments

Authors: M. Saidi, I. Djefour, F. Ait Medjber, A. Melouane, A. Gacem

Abstract:

The objective of this research is to study the physical and mechanical properties and durability of self-compacting mortars prepared by substituting a part of cement up to a percentage of 30% pozzolan according to different Blaine specific surface area (SSB1=7000 cm2/g and SSB=9000 cm2/g)). Order to evaluate durability, mortars were subjected to chemical attacks in various aggressive environments, a solution of a mixture of nitric acid and ammonium nitrate (HNO3 + NH4NO3) and a magnesium sulfate salt solution (MgSO4)) with a concentration of 10%, for a period of one month. This study is complemented by a comparative study of the durability of mortars elaborated with sulphate resistant cement (SRC). The results show that these mortars develop long-term, mechanical and chemical resistance better than mortars based Portland cement with 5% gypsum (CEM 1) and SRC. We found that the mass losses are lowest in mortars elaborated with pozzolanic cement (30% substitution with SSB2) in both of chemical attack solutions (3.28% in the solution acid and 1.16% in the salt solution) and the compressive strength gains of 14.68% and 8.5% respectively in the two media. This is due to the action of pozzolan which fixes portlandite to form hydrated calcium silicate (CSH) from the hydration of tricalcic silicate (C3S).

Keywords: aggressive environments, durability, mechanical strengths, pozzolanic cement, self-compacting mortar

Procedia PDF Downloads 216
557 Construction of Genetic Recombinant Yeasts with High Environmental Tolerance by Accumulation of Trehalose and Detoxication of Aldehyde

Authors: Yun-Chin Chung, Nileema Divate, Gen-Hung Chen, Pei-Ru Huang, Rupesh Divate

Abstract:

Many environmental factors, such as glucose concentration, ethanol, temperature, osmotic pressure and pH, decrease the production rate of ethanol using yeast as a starter. Fermentation starters with high tolerance to various stresses are always demanded for brewing industry. Trehalose, a storage carbohydrate in cell wall of yeast, plays an important role in tolerance of environmental stress by preserving integrity of plasma membrane and stabilizing proteins. Furan aldehydes are toxic to yeast and the growth rate of yeast is significantly reduced if furan aldehydes were present in the fermentation medium. In yeast, aldehyde reductase is involved in the detoxification of reactive aldehydes and consequently the growth of yeast is improved. The aims of this study were to construct a genetic recombinant Saccharomyces cerevisiae or Pichia pastoris with furfural and HMF degrading and high ethanol tolerance capacities. Yeast strains were engineered by genetic recombination for overexpression of trehalose-6-phosphate synthase gene (tps1) and aldehyde reductase gene (ari1). TPS1 gene was cloned from S. cerevisiae by reverse transcription-polymerase chain reaction (RT-PCR) and then ligated with pGAPZαC vector. The constructed vector, pGAPZC-tps1, was transformed to recombinant yeasts strain with overexpression of ari1. The transformants with pGAPZC-tps1-ari1 were generated called STA (S. cerevisiae) and PTA (P. pastoris) with overexpression of tps1, ari1. PCR with tps1-specific primers and western blot with his-tag confirmed the gene insertion and protein expression of tps1 in the transformants, respectively. The neutral trehalase gene (nth1) of STA was successfully deleted and the novel strain STAΔN will be used for further study, including the measurement of trehalose concentration and ethanol, furfural tolerance assay.

Keywords: genetic recombinant, yeast, ethanol tolerance, trehalase, aldehyde reductase

Procedia PDF Downloads 406
556 CSRFDtool: Automated Detection and Prevention of a Reflected Cross-Site Request Forgery

Authors: Alaa A. Almarzuki, Nora A. Farraj, Aisha M. Alshiky, Omar A. Batarfi

Abstract:

The number of internet users is dramatically increased every year. Most of these users are exposed to the dangers of attackers in one way or another. The reason for this lies in the presence of many weaknesses that are not known for native users. In addition, the lack of user awareness is considered as the main reason for falling into the attackers’ snares. Cross Site Request Forgery (CSRF) has placed in the list of the most dangerous threats to security in OWASP Top Ten for 2013. CSRF is an attack that forces the user’s browser to send or perform unwanted request or action without user awareness by exploiting a valid session between the browser and the server. When CSRF attack successes, it leads to many bad consequences. An attacker may reach private and personal information and modify it. This paper aims to detect and prevent a specific type of CSRF, called reflected CSRF. In a reflected CSRF, a malicious code could be injected by the attackers. This paper explores how CSRF Detection Extension prevents the reflected CSRF by checking browser specific information. Our evaluation shows that the proposed solution succeeds in preventing this type of attack.

Keywords: CSRF, CSRF detection extension, attackers, attacks

Procedia PDF Downloads 402
555 Sulfate Reducing Bacteria Based Bio-Electrochemical System: Towards Sustainable Landfill Leachate and Solid Waste Treatment

Authors: K. Sushma Varma, Rajesh Singh

Abstract:

Non-engineered landfills cause serious environmental damage due to toxic emissions and mobilization of persistent pollutants, organic and inorganic contaminants, as well as soluble metal ions. The available treatment technologies for landfill leachate and solid waste are not effective from an economic, environmental, and social standpoint. The present study assesses the potential of the bioelectrochemical system (BES) integrated with sulfate-reducing bacteria (SRB) in the sustainable treatment and decontamination of landfill wastes. For this purpose, solid waste and landfill leachate collected from different landfill sites were evaluated for long-term treatment using the integrated SRB-BES anaerobic designed bioreactors after pre-treatment. Based on periodic gas composition analysis, physicochemical characterization of the leachate and solid waste, and metal concentration determination, the present system demonstrated significant improvement in volumetric hydrogen production by suppressing methanogenesis. High reduction percentages of Be, Cr, Pb, Cd, Sb, Ni, Cr, COD, and sTOC removal were observed. This mineralization can be attributed to the synergistic effect of ammonia-assisted pre-treatment complexation and microbial sulphide formation. Despite being amended with 0.1N ammonia, the treated leachate level of NO³⁻ was found to be reduced along with SO₄²⁻. This integrated SRB-BES system can be recommended as an eco-friendly solution for landfill reclamation. The BES-treated solid waste was evidently more stabilized, as shown by a five-fold increase in surface area, and potentially useful for leachate immobilization and bio-fortification of agricultural fields. The vector arrangement and magnitude showed similar treatment with differences in magnitudes for both leachate and solid waste. These findings support the efficacy of SRB-BES in the treatment of landfill leachate and solid waste sustainably, inching a step closer to our sustainable development goals. It utilizes low-cost treatment, and anaerobic SRB adapted to landfill sites. This technology may prove to be a sustainable treatment strategy upon scaling up as its outcomes are two-pronged: landfill waste treatment and energy recovery.

Keywords: bio-electrochemical system, leachate /solid waste treatment, landfill leachate, sulfate-reducing bacteria

Procedia PDF Downloads 88
554 Bridges Seismic Isolation Using CNT Reinforced Polymer Bearings

Authors: Mohamed Attia, Vissarion Papadopoulos

Abstract:

There is no doubt that there is a continuous deterioration of structures as a result of multiple hazards which can be divided into natural hazards (e.g., earthquakes, floods, winds) and other hazards due to human behavior (e.g., ship collisions, excessive traffic, terrorist attacks). There have been numerous attempts to address the catastrophic consequences of these hazards and traditional solutions through structural design and safety factors within the design codes, but there has not been much research addressing solutions through the use of new materials that have high performance and can be more effective than usual materials such as reinforced concrete and steel. To illustrate the effect of one of the new high-performance materials, carbon nanotube-reinforced polymer (CNT/polymer) bearings with different weight fractions were simulated as structural components of seismic isolation using ABAQUS in the connection between a bridge superstructure and the substructure. The results of the analyzes showed a significant increase in the time period of the bridge and a clear decrease in the bending moment at the base of the bridge piers at each time step of the time-history analysis in the case of using CNT/polymer bearings compared to the case of direct contact between the superstructure of the bridge and the substructure.

Keywords: seismic isolation, bridges damage, earthquake hazard, earthquake resistant structures

Procedia PDF Downloads 177
553 Poverty Versus Interest-Based Loans in East Africa: Can Interest-Free Loans Rescue the Situation?

Authors: Maulana Ayoub Ali

Abstract:

“Both Socialist as well as the capitalist in the economic systems have proven their failure to ensure economic justice that serves to benefit all in the society, both the rich and the poor. In particular, capitalism is currently causing a terrifying scenario by making the rich richer and the poor poorer” . In this paper, the author looks at the level of exploitation which is taking place to small and middle entrepreneurs (SME’s), government and private employees as well as large investors in East African countries who depends on interest-based loans which undermines their lives every day due to heavy monthly returns. Numbers of families have been evicted from their family premises and SME’s properties have been attached in the courts due to failure to return their loans timely. In fact, there are a lot of issues which have taken place on the ground which badly affected number of families socially and most importantly economically due to engagement in interest-based loans offered by commercial banks in East Africa. This paper looks on the alternative ways of eliminating interest-based loans to better lives of devastated Africans who are almost “dying” of heavy debts generated through higher interest loans. Reaching to that particular root the author has visited various literatures in a bid to deeply investigate and find out the best alternative mode of enabling African SME’s, businessmen and employees to benefit from the interest-free loans. The question is whether interest-free loans can be a long term solution towards poverty alleviation in East Africa generally and Tanzania in particular.

Keywords: interest-free loans, SME’s, financial institutions, poverty, east Africa

Procedia PDF Downloads 317
552 Isolation and Characterization White Spot Syndrome Protein Envelope Protein 19 from Black Tiger Shrimp (Penaeus monodon)

Authors: Andi Aliah Hidayani, Asmi Citra Malina A. R. Tassakka, Andi Parenrengi

Abstract:

Vanname Shrimp is one of the high yielding varieties that are more resistant to virus attacks. However, now this shrimp more death due to virus attack such as white spot disease caused by white spot syndrome virus (WSSV). Various efforts have done to prevent the disease, like immunostimulatory, probiotics, and vaccine. White spot syndrome virus (WSSV) envelope protein VP19 gene is important because of its involvement in the system infection of shrimp. This study aimed to isolate and characterize an envelope protein VP19 – encoding gene of WSSV using WSSV infected Vanname Shrimp sample from some areas in South Sulawesi (Pangkep, Barru and Pinrang). The genomic of DNA were isolated from shrimp muscle using DTAB-CTAB method. Isolation of gene encoding envelope protein VP19 WSSV ws successfully performed with the results of the length of DNA fragment was 387 bp. The results of homology analysis using BLASTn homology suggested that these isolates genes from Barru, Pangkep and Pinrang have closest relationship with isolates from Mexican.

Keywords: vanname, shrimp, WSSV, viral protein 19

Procedia PDF Downloads 518
551 Determination of the Risks of Heart Attack at the First Stage as Well as Their Control and Resource Planning with the Method of Data Mining

Authors: İbrahi̇m Kara, Seher Arslankaya

Abstract:

Frequently preferred in the field of engineering in particular, data mining has now begun to be used in the field of health as well since the data in the health sector have reached great dimensions. With data mining, it is aimed to reveal models from the great amounts of raw data in agreement with the purpose and to search for the rules and relationships which will enable one to make predictions about the future from the large amount of data set. It helps the decision-maker to find the relationships among the data which form at the stage of decision-making. In this study, it is aimed to determine the risk of heart attack at the first stage, to control it, and to make its resource planning with the method of data mining. Through the early and correct diagnosis of heart attacks, it is aimed to reveal the factors which affect the diseases, to protect health and choose the right treatment methods, to reduce the costs in health expenditures, and to shorten the durations of patients’ stay at hospitals. In this way, the diagnosis and treatment costs of a heart attack will be scrutinized, which will be useful to determine the risk of the disease at the first stage, to control it, and to make its resource planning.

Keywords: data mining, decision support systems, heart attack, health sector

Procedia PDF Downloads 342
550 A Lifetime-Enhancing Monitoring Node Distribution Using Minimum Spanning Tree in Mobile Ad Hoc Networks

Authors: Sungchul Ha, Hyunwoo Kim

Abstract:

In mobile ad hoc networks, all nodes in a network only have limited resources and calculation ability. Therefore communication topology which have long lifetime is good for all nodes in mobile ad hoc networks. There are a variety of researches on security problems in wireless ad hoc networks. The existing many researches try to make efficient security schemes to reduce network power consumption and enhance network lifetime. Because a new node can join the network at any time, the wireless ad hoc networks are exposed to various threats and can be destroyed by attacks. Resource consumption is absolutely necessary to secure networks, but more resource consumption can be a critical problem to network lifetime. This paper focuses on efficient monitoring node distribution to enhance network lifetime in wireless ad hoc networks. Since the wireless ad hoc networks cannot use centralized infrastructure and security systems of wired networks, a new special IDS scheme is necessary. The scheme should not only cover all nodes in a network but also enhance the network lifetime. In this paper, we propose an efficient IDS node distribution scheme using minimum spanning tree (MST) method. The simulation results show that the proposed algorithm has superior performance in comparison with existing algorithms.

Keywords: MANETs, IDS, power control, minimum spanning tree

Procedia PDF Downloads 351
549 A Collaborative, Arts-Informed Action Research Investigation of Child-Led Assessment

Authors: Dragana Gnjatovic

Abstract:

Assessment is a burning topic in education policy and practice due to measurement-driven neoliberal agendas of quality and standardisation of assessment practice through high stakes standardised testing systems that are now influencing early childhood education. This paper presents a collaborative, arts-informed action research project which places children at the centre of their learning, with assessment as an integral part of play-based learning processes. It aims to challenge traditional approaches to assessment that are often teacher-led and decontextualised from the processes of learning through exploring approaches where children's voices are central, and their creative arts expressions are used to assess learning and development. The theoretical framework draws on Vygotsky's sociocultural theory and Freire's critical pedagogy, which indicate the importance of socially constructed reality where knowledge is the result of collaboration between children and adults. This reality perceives children as competent agents of their own learning processes. An interpretive-constructivist and critical-transformative paradigm underpin collaborative action research in a three to five-year-old setting, where creative methods like storytelling, play, drama, drawing are used to assess children's learning. As data collection and analysis are still in process, this paper will present the methodology and some data vignettes, with the aim of stimulating discussion about innovation in assessment and contribution of the collaborative enquiry in the field of Early Childhood Education and Care.

Keywords: assessment for learning, creative methodologies, collaborative action research, early childhood education and care

Procedia PDF Downloads 120
548 Presentation of Transgender identities

Authors: Tony Chapman-Wilson

Abstract:

Applied theatre is not an ultimate vehicle to create social change; but is more an opportunity of hope that the production material might affect this. Theatre-makers are able to deconstruct socially and politically challenging themes to encourage their audience to witness lived experiences as they consider themes of concern and injustice. This allows writers to (re) present the lived experiences of trans people, and for social injustice, continued transphobia, and lack of equity to be presented to an audience for debate. There needs to be a stronger position and presence of trans voices and active participation presented of these rather than just that of the cisgender-lens and standpoint. This research examines the relationship between human rights and theatre and considers global examples of this practice, as well as exploring the negatives formed from this relationship, and how this may be developed in the future. This focusses on the ability of theatre to denounce the violations of human rights and considers the power of theatre to support the importance of the awareness of violations to human rights for the raised awareness and potential for action of the audience – who may themselves be part of the oppressed, or indeed an oppressor. The fundamental assertion here is not one of evidenced social change, but of awareness raising of the audience and the potential for social activism and action. The practice of applied theatre is one that is experienced by the audience and the project participants alike, with the intention that theatre may consider how people interact with one another. This paper examines the opportunity of verbatim theatre techniques to allow for a cis-led trans-collaborative research project to (re) present intergenerational trans identities.

Keywords: applied theatre, verbatim, transgender, social justice

Procedia PDF Downloads 25
547 Story of Alex: Sociology of Gender

Authors: Karen V. Lee

Abstract:

The significance of this study involves autoethnographic research about a music teacher learning about the socialization of gender issues in teaching. Mentorship involving intervention helps with the consequences influencing a transgendered music teacher. Basic storytelling methodology involves the qualitative method of research as a theoretical framework where the author provides a storied reflection about political issues surrounding teachers and the sociology of gender. Sub-themes involve counseling, adult education to ensure students and teachers receive social, emotional, physical, spiritual, and educational resources that evoke visceral, emotional responses from the audience. Major findings share how stories are helpful resources for others who struggle with the socialization of gender. It is hoped the research dramatizes an episodic yet incomplete story that highlights the circumstances surrounding the protagonist having his sex reassignment surgery during his undergraduate education degree. In conclusion, the research is a reflexive storied framework that embraces a positive outlook about a transgendered teacher during his masectomy. The sensory experience seeks verisimilitude by evoking lifelike and believable feelings from others. Thus, the scholarly importance of the sociology of gender and society provides transformative aspects that contributes to social change. Overall, the surgery surrounding the story about transgendered issues are not uncommon in society. Thus, continued education supports the moral mission to help teachers overcome and understand issues of gender that can socially impacts their professional lives as teachers.

Keywords: sociology of gender, transgender, music teachers, story, autoethnography as research, ideology

Procedia PDF Downloads 293
546 The Strategy of Orbit Avoidance for Optical Remote Sensing Satellite

Authors: Dianxun Zheng, Wuxing Jing, Lin Hetong

Abstract:

Optical remote sensing satellite, always running on the Sun-synchronous orbit, equipped laser warning equipment to alert CCD camera from laser attack. There have three ways to protect the CCD camera, closing the camera cover satellite attitude maneuver and satellite orbit avoidance. In order to enhance the safety of optical remote sensing satellite in orbit, this paper explores the strategy of satellite avoidance. The avoidance strategy is expressed as the evasion of pre-determined target points in the orbital coordinates of virtual satellite. The so-called virtual satellite is a passive vehicle which superposes a satellite at the initial stage of avoidance. The target points share the consistent cycle time and the same semi-major axis with the virtual satellite, which ensures the properties of the Sun-synchronous orbit remain unchanged. Moreover, to further strengthen the avoidance capability of satellite, it can perform multi-object avoid maneuvers. On occasions of fulfilling the orbit tasks of the satellite, the orbit can be restored back to virtual satellite through orbit maneuvers. There into, the avoid maneuvers adopts pulse guidance. and the fuel consumption is also optimized. The avoidance strategy discussed in this article is applicable to avoidance for optical remote sensing satellite when encounter the laser hostile attacks.

Keywords: optical remote sensing satellite, always running on the sun-synchronous

Procedia PDF Downloads 383
545 The Strategic Entering Time of a Commerce Platform

Authors: Chia-li Wang

Abstract:

The surge of service and commerce platforms, such as e-commerce and internet-of-things, have rapidly changed our lives. How to avoid the congestion and get the job done in the platform is now a common problem that many people encounter every day. This requires platform users to make decisions about when to enter the platform. To that end, we investigate the strategic entering time of a simple platform containing random numbers of buyers and sellers of some item. Upon a trade, the buyer and the seller gain respective profits, yet they pay the cost of waiting in the platform. To maximize their expected payoffs from trading, both buyers and sellers can choose their entering times. This creates an interesting and practical framework of a game that is played among buyers, among sellers, and between them. That is, a strategy employed by a player is not only against players of its type but also a response to those of the other type, and, thus, a strategy profile is composed of strategies of buyers and sellers. The players' best response, the Nash equilibrium (NE) strategy profile, is derived by a pair of differential equations, which, in turn, are used to establish its existence and uniqueness. More importantly, its structure sheds valuable insights of how the entering strategy of one side (buyers or sellers) is affected by the entering behavior of the other side. These results provide a base for the study of dynamic pricing for stochastic demand-supply imbalances. Finally, comparisons between the social welfares (the sum of the payoffs incurred by individual participants) obtained by the optimal strategy and by the NE strategy are conducted for showing the efficiency loss relative to the socially optimal solution. That should help to manage the platform better.

Keywords: double-sided queue, non-cooperative game, nash equilibrium, price of anarchy

Procedia PDF Downloads 72
544 Elderly Care for Bereaved Parents Following the Death of an Only Child in Mainland China

Authors: Chao Fang

Abstract:

Due to the Confucian emphasis on filial piety and an undeveloped social welfare system in mainland China, adult children are both socially and legally obliged to care for their parents, including financial assistance and physical care as well as emotional and social support. Thus a family-centred care pattern for elderly people has been firmly established in China. However, because of the nationwide ‘One Child Policy’, over one million parents are excluded from such care because of the death of their only child and, therefore, their primary caregiver. Without their child’s support, these parents must manage the day to day challenges of growing old alone, with little support from society. By overturning established expectations of a ‘good’ elderly life, the loss of an only child may be accompanied by social and self-stigmatization, pushing these bereaved parents to the margin of society and threatening their economic, physical, emotional and social well-being. More importantly, since the One Child Policy was implemented from the late 1970s and early 1980s, the first generation of bereaved or ‘Shidu’ parents has reached an age at which those parents need elderly care. However, their predicament has been largely ignored. This paper reports on a qualitative interview study that found elderly care to be the main concern for Shidu parents’ everyday life. The paper identifies and discusses the concerns these bereaved parents raised about the prospect of having nowhere to turn at a time of increased need for financial, physical, social and emotional support in old age. The paper also identifies how Shidu parents have been coming together in grief and negotiate to make their predicament known to the government and wider society and to re-define their elderly life by rebuilding a sense of ‘family’.

Keywords: culture, bereavement, China, elderly care

Procedia PDF Downloads 260
543 Detection of Cyberattacks on the Metaverse Based on First-Order Logic

Authors: Sulaiman Al Amro

Abstract:

There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.

Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic

Procedia PDF Downloads 26
542 Human-Tiger Conflict in Chitwan National Park, Nepal

Authors: Abishek Poudel

Abstract:

Human-tiger conflicts are serious issues of conflicts between local people and park authority and the conflicting situation potentially play negative role in park management. The study aimed (1) To determine the trend and nature of human-tiger conflicts (2) To understand people's perception and mitigation measures towards tiger conservation. Both primary and secondary information were used to determine human- tiger conflicts in Chitwan National Park. Systematic random sampling with 5% intensity was done to collect the perception of the villagers regarding human-tiger conflicts. The study sites were selected based on frequencies of incidences of human attacks and livestock depredation viz. Rajahar and Ayodhyapuri VDCs respectively. The trend of human casualties by tiger has increased in last five year whereas the trend of livestock has decreased. Reportedly, between 2008 and 2012, tigers killed 22 people, injured 10 and killed at least 213 livestock. Conflict was less common in the park and more intense in the sub-optimal habitats of Buffer Zone. Goat was the most vulnerable livestock followed by cattle. The livestock grazing and human intrusion into tiger habitat were the causes of conflicts. Developing local stewardship and support for tiger conservation, livestock insurance, and compensation policy simplification may help reduce human-tiger conflicts.

Keywords: livestock depredation, sub optimal habitat, human-tiger, local stewardship

Procedia PDF Downloads 449
541 Between Buddha and Tsar: Kalmyk Buddhist Sangha in Late Russian Empire

Authors: Elzyata Kuberlinova

Abstract:

This study explores how the Kalmyk Buddhist sangha responded to the Russian empire’s administrative integration and how the Buddhist clerical institutions were shaped in the process of interaction with representatives of the predominantly Orthodox state. The eighteenth-nineteenth century Russian imperial regime adhered to a religion-centred framework to govern its diverse subjects. Within this framework, any form of religious authority was considered a useful tool in the imperial quest for legibility. As such, rather than imposing religious homogeneity, the Russian administration engineered a framework of religious toleration and integrated the non-Orthodox clerical institutions in the empire’s administration. In its attempt to govern the large body of Kalmyk Buddhist sangha, the Russian government had to incorporate the sangha into the imperial institutional establishment. To this end, the Russian government founded the Lamaist Spiritual Governing Board in 1834, which became a part of the civil administration, where the Kalmyk Buddhist affairs were managed under the supervision of the Russian secular authorities. In 1847 the Lamaist Spiritual Board was abolished and Buddhist religious authority was transferred to the Lama of the Kalmyk people. From 1847 until the end of the empire in 1917 the Lama was the manager and intermediary figure between the Russian authorities and the Kalmyks where religious affairs were concerned. Substantial evidence collected in archives in Elista, Astrakhan, Stavropol and St.Petersburg show that despite being on the government’s payroll, first the Lamaist Spiritual Governing Board and later on the Lama did not always serve the interests of the state, and did not always comply with the Russian authorities’ orders. Although being incorporated into the state administrative system the Lama often found ways to manoeuvre the web of the Russian imperial bureaucracy in order to achieve his own goals. The Lama often used ‘every-day forms of resistance’ such as feigned misinterpretation, evasion, false compliance, feigned ignorance, and sabotage in order to resist without directly confronting or challenging the state orders.

Keywords: Buddhist Sangha, intermediary, Kalmyks, Lama, legibility, resistance, reform, Russian empire

Procedia PDF Downloads 205
540 Prevalence of Workplace Bullying in Hong Kong: A Latent Class Analysis

Authors: Catalina Sau Man Ng

Abstract:

Workplace bullying is generally defined as a form of direct and indirect maltreatment at work including harassing, offending, socially isolating someone or negatively affecting someone’s work tasks. Workplace bullying is unfortunately commonplace around the world, which makes it a social phenomenon worth researching. However, the measurements and estimation methods of workplace bullying seem to be diverse in different studies, leading to dubious results. Hence, this paper attempts to examine the prevalence of workplace bullying in Hong Kong using the latent class analysis approach. It is often argued that the traditional classification of workplace bullying into the dichotomous 'victims' and 'non-victims' may not be able to fully represent the complex phenomenon of bullying. By treating workplace bullying as one latent variable and examining the potential categorical distribution within the latent variable, a more thorough understanding of workplace bullying in real-life situations may hence be provided. As a result, this study adopts a latent class analysis method, which was tested to demonstrate higher construct and higher predictive validity previously. In the present study, a representative sample of 2814 employees (Male: 54.7%, Female: 45.3%) in Hong Kong was recruited. The participants were asked to fill in a self-reported questionnaire which included measurements such as Chinese Workplace Bullying Scale (CWBS) and Chinese Version of Depression Anxiety Stress Scale (DASS). It is estimated that four latent classes will emerge: 'non-victims', 'seldom bullied', 'sometimes bullied', and 'victims'. The results of each latent class and implications of the study will also be discussed in this working paper.

Keywords: latent class analysis, prevalence, survey, workplace bullying

Procedia PDF Downloads 308
539 A Historical Overview and Supplementation of the Dyad Concept of Industrial Marketing

Authors: Kimmo J. Kurppa

Abstract:

This paper describes the development of the buyer-supplier dyad concept over the years and proposes improvements, clarifications and extensions to the prevailing definitions published in 1970’s and 1980’s. This paper suggests a partition of the buyer-supplier dyad to concepts of Commercial Dyad (dyadic interaction in vertical relationships) and Innovative Dyad (dyadic interaction in horizontal relationship) since dyadic interaction takes place in two major types of contexts between industrial firms. Especially the context of joint product development in a dyadic relationship has not been adequately recognized being totally different from the interaction taking place in commercial buyer-supplier interaction. This paper provides therefore a solution to the existing gap in research by clarifying the descriptions and the context where dyadic interaction takes place between industrial firms. This paper also illustrates and explains how the firm’s organization and the interaction taking place inside it, is connected to the dyadic interaction structure between the firm and its partner firm. This theme has been discussed earlier but the phenomenon has not been adequately described and has not been illustrated in earlier research. This conceptual study has been interested in how the dyad concept of Industrial Marketing has been defined in the earlier research and how the definition could be improved. This conceptual paper has been constructed by using the systematic review methodology and proposes avenues for future research. The concept and existence of relationship and interaction between firm’s internal interaction network and external interaction between firm’s dyadic counterparts, need to be verified through empirical research.

Keywords: dyadic interaction, industrial dyad, buyer-supplier relationship, strategic reciprocity, experience, socially adjusted opportunism

Procedia PDF Downloads 203
538 An Immune-Inspired Web Defense Architecture

Authors: Islam Khalil, Amr El-Kadi

Abstract:

With the increased use of web technologies, microservices, and Application Programming Interface (API) for integration between systems, and with the development of containerization of services on the operating system level as a method of isolating system execution and for easing the deployment and scaling of systems, there is a growing need as well as opportunities for providing platforms that improve the security of such services. In our work, we propose an architecture for a containerization platform that utilizes various concepts derived from the human immune system. The goal of the proposed containerization platform is to introduce the concept of slowing down or throttling suspected malicious digital pathogens (intrusions) to reduce their damage footprint while providing more opportunities for forensic inspection of suspected pathogens in addition to the ability to snapshot, rollback, and recover from possible damage. The proposed platform also leverages existing intrusion detection algorithms by integrating and orchestrating their cooperative operation for more effective intrusion detection. We show how this model reduces the damage footprint of intrusions and gives a greater time window for forensic investigation. Moreover, during our experiments, our proposed platform was able to uncover unintentional system design flaws that resulted in internal DDoS-like attacks by submodules of the system itself rather than external intrusions.

Keywords: containers, human immunity, intrusion detection, security, web services

Procedia PDF Downloads 75
537 Infestations of Olive Fruit Fly, Bactrocera oleae (Rossi) (Diptera: Tephritidae), in Different Olive Cultivars in Çanakkale, Turkey

Authors: Hanife Genç

Abstract:

The olive fruit fly, Bactrocera oleae (Rossi), is an economically important and endemic pest in olive (Oleae europae) orchards in Turkey. The aim of this study was to determine olive fruit fly infestation in different olive cultivars in the laboratory. Olive fly infested fruits were collected in Çanakkale province to establish wild fly population. After having reproductive olive fly colonies, 14 olive cultivars were tested in the controlled laboratory conditions, at 23±2 °C, 65% RH and 16:8 h (light: dark) photoperiod. The olive samples from 14 different olive cultivars were collected in October 2015, in Campus of Dardanos, Çanakkale Onsekiz Mart University. Observations were carried out detecting some biological parameters such as the number of oviposition stings, active infestation, total infestation, the number of pupae and the adult emergence. The results indicated that oviposition stings were not associated with pupal yield. A few pupae were found within olive fruits which were not able to exit. Screening of the varieties suggested that less susceptible cultivar to olive fruit fly attacks was Arbequin while Gemlik-2M 2/3 showed significant susceptibility. Ovipositional preference of olive fly females and the success of larval development in different olive varieties are crucial for establishing new olive orchards to prevent high olive fruit fly infestation.

Keywords: infestation, olive fruit fly, olive cultivars, oviposition sting

Procedia PDF Downloads 199
536 Rehabilitation and Conservation of Mangrove Forest as Pertamina Corporate Social Responsibility Approach in Prevention Damage Climate in Indonesia

Authors: Nor Anisa

Abstract:

This paper aims to describe the use of conservation and rehabilitation of Mangrove forests as an alternative area in protecting the natural environment and ecosystems and ecology, community education and innovation of sustainable industrial development such as oil companies, gas and coal. The existence of globalization encourages energy needs such as gas, diesel and coal as an unaffected resource which is a basic need for human life while environmental degradation and natural phenomena continue to occur in Indonesia, especially global warming, sea water pollution, extinction of animal steps. The phenomenon or damage to nature in Indonesia is caused by a population explosion in Indonesia that causes unemployment, the land where the residence will disappear so that this will encourage the exploitation of nature and the environment. Therefore, Pertamina as a state-owned oil and gas company carries out its social responsibility efforts, namely to carry out conservation and rehabilitation and management of Mangrove fruit seeds which will provide an educational effect on the benefits of Mangrove seed maintenance. The method used in this study is a qualitative method and secondary data retrieval techniques where data is taken based on Pertamina activity journals and websites that can be accounted for. So the conclusion of this paper is: the benefits and function of conservation of mangrove forests in Indonesia physically, chemically, biologically and socially and economically and can provide innovation to the CSR (Corporate Social Responsibility) of the company in continuing social responsibility in the scope of environmental conservation and social education.

Keywords: mangrove, environmental damage, conservation and rehabilitation, innovation of corporate social responsibility

Procedia PDF Downloads 121
535 Advancing Environmental Remediation Through the Production of Functional Porous Materials from Phosphorite Residue Tailings

Authors: Ali Mohammed Yimer, Ayalew Assen, Youssef Belmabkhout

Abstract:

Environmental remediation is a pressing global concern, necessitating innovative strategies to address the challenges posed by industrial waste and pollution. This study aims to advance environmental remediation by developing cutting-edge functional porous materials from phosphorite residue tailings. Phosphorite mining activities generate vast amounts of waste, which pose significant environmental risks due to their contaminants. The proposed approach involved transforming these phosphorite residue tailings into valuable porous materials through a series of physico-chemical processes including milling, acid-base leaching, designing or templating as well as formation processes. The key components of the tailings were extracted and processed to produce porous arrays with high surface area and porosity. These materials were engineered to possess specific properties suitable for environmental remediation applications, such as enhanced adsorption capacity and selectivity for target contaminants. The synthesized porous materials were thoroughly characterized using advanced analytical techniques (XRD, SEM-EDX, N2 sorption, TGA, FTIR) to assess their structural, morphological, and chemical properties. The performance of the materials in removing various pollutants, including heavy metals and organic compounds, were evaluated through batch adsorption experiments. Additionally, the potential for material regeneration and reusability was investigated to enhance the sustainability of the proposed remediation approach. The outdoors of this research holds significant promise for addressing the environmental challenges associated with phosphorite residue tailings. By valorizing these waste materials into porous materials with exceptional remediation capabilities, this study contributes to the development of sustainable and cost-effective solutions for environmental cleanup. Furthermore, the utilization of phosphorite residue tailings in this manner offers a potential avenue for the remediation of other contaminated sites, thereby fostering a circular economy approach to waste management.

Keywords: functional porous materials, phosphorite residue tailings, adsorption, environmental remediation, sustainable solutions

Procedia PDF Downloads 43
534 Mothering in Self- Defined Challenging Circumstances: A Photo-Elicitation Study of Motherhood and the Role of Social Media

Authors: Joanna Apps, Elena Markova

Abstract:

Concepts of the ideal mother and ideal mothering are disseminated through familial experiences, religious and cultural depictions of mothers and the national media. In recent years social media can also be added to the channels by which mothers and motherhood are socially constructed. However, the gulf between these depictions, -or in the case of social media ‘self-curations’ - of motherhood and lived experience has never been wider, particularly for women in disadvantaged or difficult circumstances. We report on a study of four lone mothers who were living with one or more of the following: limiting long term illness, large families, in temporary accommodation and on low incomes. The mothers were interviewed 3 times and invited to take a series of photos reflecting their lives in between each of the interviews. These photographs were used to ground the interviews in lived experience and as stimuli to discuss how the images within them compared to portrayals of mothers and motherhood that participants were exposed to on social media. The objectives of the study were to explore how mothers construct their identity in challenging and disadvantaged circumstances; to consider what their photographs of everyday life tell us about their experiences and understand the impact idealised images of motherhood have on real mothers in difficult circumstances. The results suggested that the mothers both strived to adhere to certain ideals of motherhood and acknowledged elements of these as partially or wholly impossible to achieve. The lack of depictions, in both national and social media, of motherhood that corresponded with their lived experience inhibited the mothers’ use of social media. Other themes included: lack of control, frustration and strain; and parental pride, love, humour, resilience, and hope.

Keywords: motherhood, social media, photography, poverty

Procedia PDF Downloads 142
533 Modification Encryption Time and Permutation in Advanced Encryption Standard Algorithm

Authors: Dalal N. Hammod, Ekhlas K. Gbashi

Abstract:

Today, cryptography is used in many applications to achieve high security in data transmission and in real-time communications. AES has long gained global acceptance and is used for securing sensitive data in various industries but has suffered from slow processing and take a large time to transfer data. This paper suggests a method to enhance Advance Encryption Standard (AES) Algorithm based on time and permutation. The suggested method (MAES) is based on modifying the SubByte and ShiftRrows in the encryption part and modification the InvSubByte and InvShiftRows in the decryption part. After the implementation of the proposal and testing the results, the Modified AES achieved good results in accomplishing the communication with high performance criteria in terms of randomness, encryption time, storage space, and avalanche effects. The proposed method has good randomness to ciphertext because this method passed NIST statistical tests against attacks; also, (MAES) reduced the encryption time by (10 %) than the time of the original AES; therefore, the modified AES is faster than the original AES. Also, the proposed method showed good results in memory utilization where the value is (54.36) for the MAES, but the value for the original AES is (66.23). Also, the avalanche effects used for calculating diffusion property are (52.08%) for the modified AES and (51.82%) percentage for the original AES.

Keywords: modified AES, randomness test, encryption time, avalanche effects

Procedia PDF Downloads 228
532 Synthesis, Characterization and Photocatalytic Activity of Electrospun Zinc and/or Titanium Oxide Nanofibers for Methylene Blue Degradation

Authors: Zainab Dahrouch, Beatrix Petrovičová, Claudia Triolo, Fabiola Pantò, Angela Malara, Salvatore Patanè, Maria Allegrini, Saveria Santangelo

Abstract:

Synthetic dyes dispersed in water cause environmental damage and have harmful effects on human health. Methylene blue (MB) is broadly used as a dye in the textile, pharmaceutical, printing, cosmetics, leather, and food industries. The complete removal of MB is difficult due to the presence of aromatic rings in its structure. The present study is focused on electrospun nanofibers (NFs) with engineered architecture and surface to be used as catalysts for the photodegradation of MB. Ti and/or Zn oxide NFs are produced by electrospinning precursor solutions with different Ti: Zn molar ratios (from 0:1 to 1:0). Subsequent calcination and cooling steps are operated at fast rates to generate porous NFs with capture centers to reduce the recombination rate of the photogenerated charges. The comparative evaluation of the NFs as photocatalysts for the removal of MB from an aqueous solution with a dye concentration of 15 µM under UV irradiation shows that the binary (wurtzite ZnO and anatase TiO₂) oxides exhibit higher catalytic activity compared to ternary (ZnTiO₃ and Zn₂TiO₄) oxides. The higher band gap and lower crystallinity of the ternary oxides are responsible for their lower photocatalytic activity. It has been found that the optimal load for the wurtzite ZnO is 0.66 mg mL⁻¹, obtaining a degradation rate of 7.94.10⁻² min⁻¹. The optimal load for anatase TiO₂ is lower (0.33 mg mL⁻¹) and the corresponding rate constant (1.12×10⁻¹ min⁻¹) is higher. This finding (higher activity with lower load) is of crucial importance for the scaling up of the process on an industrial scale. Indeed, the anatase NFs outperform even the commonly used P25-TiO₂ benchmark. Besides, they can be reused twice without any regeneration treatment, with 5.2% and 18.7% activity decrease after second and third use, respectively. Thanks to the scalability of the electrospinning technique, this laboratory-scale study provides a perspective towards the sustainable large-scale manufacture of photocatalysts for the treatment of industry effluents.

Keywords: anatase, capture centers, methylene blue dye, nanofibers, photodegradation, zinc oxide

Procedia PDF Downloads 140
531 Social Media as a Source of Radicalization; A Case Study of Pakistan

Authors: Manam Hanfi

Abstract:

Pakistan is a victim of terrorism since 9/11 attacks. Since then it is a home for violence and extremism. One of the major reasons behind rising violence and extremism in Pakistan is radicalization. Pakistan has seen and suffered from the modification of terrorism from old to new. In new terrorism, the terrorist organizations incorporated internet to disseminate propaganda, to recruit and train people. The study focuses on the relationship between Pakistan and new terrorism and examines how the internet is being used by terrorist organizations. The study investigates radicalization through social media by terrorist organizations in Pakistan with the help of case studies. The study suggests five ways to counter radicalization, including, counter narrative on social media, content analysis of the data on the internet, curriculum and madrassa reforms, teaching peace education in the educational institutions and use of technical software such as eGLYPH to quickly remove violent data from social media. Lastly, the research attempted to contribute in counter-radicalization by combining the media dependency model and ideas for counter-radicalization. The dependency model elaborates the impact of mass media content on the audience. If media dependency is high, it will cause cognitive, affective and behavioral changes. In order to counter radicalization through social media, it is important to make cognitive, affective and behavioral changes with the help of counter-radicalization suggestions.

Keywords: counter radicalization, extremism, social media, terrorism

Procedia PDF Downloads 139
530 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework

Authors: Abdulrahman S. Alqahtani

Abstract:

The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.

Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism

Procedia PDF Downloads 382
529 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network

Authors: Kamyar Fakhr, Roozbeh Salmani

Abstract:

Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.

Keywords: biometric system, convolutional neural network, cyber-attack, secure

Procedia PDF Downloads 197