Search results for: general attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5562

Search results for: general attacks

4782 Health and Safety Risk Assesment with Electromagnetic Field Exposure for Call Center Workers

Authors: Dilsad Akal

Abstract:

Aim: Companies communicate with each other and with their costumers via call centers. Call centers are defined as stressful because of their uncertain working hours, inadequate relief time, performance based system and heavy workload. In literature, this sector is defined as risky as mining sector by means of health and safety. The aim of this research is to enlight the relatively dark area. Subject and Methods: The collection of data for this study completed during April-May 2015 for the two selected call centers in different parts of Turkey. The applied question mostly investigated the health conditions of call center workers. Electromagnetic field measurements were completed at the same time with applying the question poll. The ratio of employee accessibility noted as 73% for the first call center and 87% for the second. Results: The results of electromagnetic field measurements were as between 371 V/m-32 V/m for the first location and between 370 V/m-61 V/m for the second. The general complaints of the employees for both workplaces can be counted as; inadequate relief time, inadequate air conditioning, disturbance, poor thermal conditions, inadequate or extreme lighting. Furthermore, musculoskeletal discomfort, stress, ear and eye discomfort are main health problems of employees. Conclusion: The measured values and the responses to the question poll were found parallel with the other similar research results in literature. At the end of this survey, a risk map of workplace was prepared in terms of safety and health at work in general and some suggestions for resolution were provided.

Keywords: call center, health and safety, electromagnetic field, risk map

Procedia PDF Downloads 177
4781 Analyzing the Risk Based Approach in General Data Protection Regulation: Basic Challenges Connected with Adapting the Regulation

Authors: Natalia Kalinowska

Abstract:

The adoption of the General Data Protection Regulation, (GDPR) finished the four-year work of the European Commission in this area in the European Union. Considering far-reaching changes, which will be applied by GDPR, the European legislator envisaged two-year transitional period. Member states and companies have to prepare for a new regulation until 25 of May 2018. The idea, which becomes a new look at an attitude to data protection in the European Union is risk-based approach. So far, as a result of implementation of Directive 95/46/WE, in many European countries (including Poland) there have been adopted very particular regulations, specifying technical and organisational security measures e.g. Polish implementing rules indicate even how long password should be. According to the new approach from May 2018, controllers and processors will be obliged to apply security measures adequate to level of risk associated with specific data processing. The risk in GDPR should be interpreted as the likelihood of a breach of the rights and freedoms of the data subject. According to Recital 76, the likelihood and severity of the risk to the rights and freedoms of the data subject should be determined by reference to the nature, scope, context and purposes of the processing. GDPR does not indicate security measures which should be applied – in recitals there are only examples such as anonymization or encryption. It depends on a controller’s decision what type of security measures controller considered as sufficient and he will be responsible if these measures are not sufficient or if his identification of risk level is incorrect. Data protection regulation indicates few levels of risk. Recital 76 indicates risk and high risk, but some lawyers think, that there is one more category – low risk/now risk. Low risk/now risk data processing is a situation when it is unlikely to result in a risk to the rights and freedoms of natural persons. GDPR mentions types of data processing when a controller does not have to evaluate level of risk because it has been classified as „high risk” processing e.g. processing on a large scale of special categories of data, processing with using new technologies. The methodology will include analysis of legal regulations e.g. GDPR, the Polish Act on the Protection of personal data. Moreover: ICO Guidelines and articles concerning risk based approach in GDPR. The main conclusion is that an appropriate risk assessment is a key to keeping data safe and avoiding financial penalties. On the one hand, this approach seems to be more equitable, not only for controllers or processors but also for data subjects, but on the other hand, it increases controllers’ uncertainties in the assessment which could have a direct impact on incorrect data protection and potential responsibility for infringement of regulation.

Keywords: general data protection regulation, personal data protection, privacy protection, risk based approach

Procedia PDF Downloads 249
4780 Determinants of Economic Growth in Pakistan: A Structural Vector Auto Regression Approach

Authors: Muhammad Ajmair

Abstract:

This empirical study followed structural vector auto regression (SVAR) approach proposed by the so-called AB-model of Amisano and Giannini (1997) to check the impact of relevant macroeconomic determinants on economic growth in Pakistan. Before that auto regressive distributive lag (ARDL) bound testing technique and time varying parametric approach along with general to specific approach was employed to find out relevant significant determinants of economic growth. To our best knowledge, no author made such a study that employed auto regressive distributive lag (ARDL) bound testing and time varying parametric approach with general to specific approach in empirical literature, but current study will bridge this gap. Annual data was taken from World Development Indicators (2014) during period 1976-2014. The widely-used Schwarz information criterion and Akaike information criterion were considered for the lag length in each estimated equation. Main findings of the study are that remittances received, gross national expenditures and inflation are found to be the best relevant positive and significant determinants of economic growth. Based on these empirical findings, we conclude that government should focus on overall economic growth augmenting factors while formulating any policy relevant to the concerned sector.

Keywords: economic growth, gross national expenditures, inflation, remittances

Procedia PDF Downloads 195
4779 The Strategy of Orbit Avoidance for Optical Remote Sensing Satellite

Authors: Dianxun Zheng, Wuxing Jing, Lin Hetong

Abstract:

Optical remote sensing satellite, always running on the Sun-synchronous orbit, equipped laser warning equipment to alert CCD camera from laser attack. There have three ways to protect the CCD camera, closing the camera cover satellite attitude maneuver and satellite orbit avoidance. In order to enhance the safety of optical remote sensing satellite in orbit, this paper explores the strategy of satellite avoidance. The avoidance strategy is expressed as the evasion of pre-determined target points in the orbital coordinates of virtual satellite. The so-called virtual satellite is a passive vehicle which superposes a satellite at the initial stage of avoidance. The target points share the consistent cycle time and the same semi-major axis with the virtual satellite, which ensures the properties of the Sun-synchronous orbit remain unchanged. Moreover, to further strengthen the avoidance capability of satellite, it can perform multi-object avoid maneuvers. On occasions of fulfilling the orbit tasks of the satellite, the orbit can be restored back to virtual satellite through orbit maneuvers. There into, the avoid maneuvers adopts pulse guidance. and the fuel consumption is also optimized. The avoidance strategy discussed in this article is applicable to avoidance for optical remote sensing satellite when encounter the laser hostile attacks.

Keywords: optical remote sensing satellite, always running on the sun-synchronous

Procedia PDF Downloads 393
4778 Ensemble Methods in Machine Learning: An Algorithmic Approach to Derive Distinctive Behaviors of Criminal Activity Applied to the Poaching Domain

Authors: Zachary Blanks, Solomon Sonya

Abstract:

Poaching presents a serious threat to endangered animal species, environment conservations, and human life. Additionally, some poaching activity has even been linked to supplying funds to support terrorist networks elsewhere around the world. Consequently, agencies dedicated to protecting wildlife habitats have a near intractable task of adequately patrolling an entire area (spanning several thousand kilometers) given limited resources, funds, and personnel at their disposal. Thus, agencies need predictive tools that are both high-performing and easily implementable by the user to help in learning how the significant features (e.g. animal population densities, topography, behavior patterns of the criminals within the area, etc) interact with each other in hopes of abating poaching. This research develops a classification model using machine learning algorithms to aid in forecasting future attacks that is both easy to train and performs well when compared to other models. In this research, we demonstrate how data imputation methods (specifically predictive mean matching, gradient boosting, and random forest multiple imputation) can be applied to analyze data and create significant predictions across a varied data set. Specifically, we apply these methods to improve the accuracy of adopted prediction models (Logistic Regression, Support Vector Machine, etc). Finally, we assess the performance of the model and the accuracy of our data imputation methods by learning on a real-world data set constituting four years of imputed data and testing on one year of non-imputed data. This paper provides three main contributions. First, we extend work done by the Teamcore and CREATE (Center for Risk and Economic Analysis of Terrorism Events) research group at the University of Southern California (USC) working in conjunction with the Department of Homeland Security to apply game theory and machine learning algorithms to develop more efficient ways of reducing poaching. This research introduces ensemble methods (Random Forests and Stochastic Gradient Boosting) and applies it to real-world poaching data gathered from the Ugandan rain forest park rangers. Next, we consider the effect of data imputation on both the performance of various algorithms and the general accuracy of the method itself when applied to a dependent variable where a large number of observations are missing. Third, we provide an alternate approach to predict the probability of observing poaching both by season and by month. The results from this research are very promising. We conclude that by using Stochastic Gradient Boosting to predict observations for non-commercial poaching by season, we are able to produce statistically equivalent results while being orders of magnitude faster in computation time and complexity. Additionally, when predicting potential poaching incidents by individual month vice entire seasons, boosting techniques produce a mean area under the curve increase of approximately 3% relative to previous prediction schedules by entire seasons.

Keywords: ensemble methods, imputation, machine learning, random forests, statistical analysis, stochastic gradient boosting, wildlife protection

Procedia PDF Downloads 286
4777 Detection of Cyberattacks on the Metaverse Based on First-Order Logic

Authors: Sulaiman Al Amro

Abstract:

There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.

Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic

Procedia PDF Downloads 36
4776 Introducing a Practical Model for Instructional System Design Based on Determining of the knowledge Level of the Organization: Case Study of Isfahan Public Transportation Co.

Authors: Mojtaba Aghajari, Alireza Aghasi

Abstract:

The first challenge which the current research faced has been the identification or determination of the level of knowledge in Isfahan public transportation corporation, and the second challenge has been the recognition and choice of a proper approach for the instructional system design. Responding these two challenges will present an appropriate model of instructional system design. In order to respond the first challenge or question, Nonaka and Takeuchi KM model has been utilized due to its universality among the 26 models proposed so far. The statistical population of this research included 2200 people, among which 200 persons were chosen as the sample of the research by the use of Morgan’s method. The data gathering has been carried out by the means of a questionnaire based on Nonaka and Takeuchi KM model, analysis of which has been done by SPSS program. The output of this questionnaire, yielding the point of 1.96 (out of 5 points), revealed that the general condition of Isfahan public transportation corporation is weak concerning its being knowledge-centered. After placing this output on Jonassen’s continuum, it was revealed that the appropriate approach for instructional system design is the system (or behavioral) approach. Accordingly, different steps of the general model of ADDIE, which covers all of the ISO10015 standards, were adopted in the act of designing. Such process in Isfahan public transportation corporation was designed and divided into three main steps, including: instructional designing and planning, instructional course planning, determination of the evaluation and the effectiveness of the instructional courses.

Keywords: instructional system design, system approach, knowledge management, employees

Procedia PDF Downloads 316
4775 Human-Tiger Conflict in Chitwan National Park, Nepal

Authors: Abishek Poudel

Abstract:

Human-tiger conflicts are serious issues of conflicts between local people and park authority and the conflicting situation potentially play negative role in park management. The study aimed (1) To determine the trend and nature of human-tiger conflicts (2) To understand people's perception and mitigation measures towards tiger conservation. Both primary and secondary information were used to determine human- tiger conflicts in Chitwan National Park. Systematic random sampling with 5% intensity was done to collect the perception of the villagers regarding human-tiger conflicts. The study sites were selected based on frequencies of incidences of human attacks and livestock depredation viz. Rajahar and Ayodhyapuri VDCs respectively. The trend of human casualties by tiger has increased in last five year whereas the trend of livestock has decreased. Reportedly, between 2008 and 2012, tigers killed 22 people, injured 10 and killed at least 213 livestock. Conflict was less common in the park and more intense in the sub-optimal habitats of Buffer Zone. Goat was the most vulnerable livestock followed by cattle. The livestock grazing and human intrusion into tiger habitat were the causes of conflicts. Developing local stewardship and support for tiger conservation, livestock insurance, and compensation policy simplification may help reduce human-tiger conflicts.

Keywords: livestock depredation, sub optimal habitat, human-tiger, local stewardship

Procedia PDF Downloads 460
4774 Analysis of Basic Science Curriculum as Correlates of Secondary School Students' Achievement in Science Test in Oyo State

Authors: Olubiyi Johnson Ezekiel

Abstract:

Basic science curriculum is an on-going effort towards developing the potential of manner to produce individuals in a holistic and integrated person, who are intellectually, spiritually, emotionally and physically balanced and harmonious. The main focus of this study is to determine the relationship between students’ achievement in junior school certificate examination (JSCE) and senior school basic science achievement test (SSBSAT) on the basis of all the components of basic science. The study employed the descriptive research of the survey type and utilized junior school certificate examination and senior school basic science achievement test(r = .87) scores as instruments. The data collected were subjected to Pearson product moment correlation, Spearman rank correlation, regression analysis and analysis of variance. The result of the finding revealed that the mean effects of the achievement in all the components of basic science on SSBSAT are significantly different from zero. Based on the results of the findings, it was concluded that the relationship between students’ achievement in JSCE and SSBSAT was weak and to achieve a unit increase in the students’ achievement in the SSBSAT when other subjects are held constant, we have to increase the learning of: -physics by 0.081 units; -chemistry by 0.072 units; -biology by 0.025 units and general knowledge by 0.097 units. It was recommended among others, that general knowledge aspect of basic science should be included in either physics or chemistry aspect of basic science.

Keywords: basic science curriculum, students’ achievement, science test, secondary school students

Procedia PDF Downloads 441
4773 Comparative Study of the Effect of Three Fungicides: Tilt and Artea Amistarxtra about Growing Wheat, Hard, and Soft and Their Impact on Grain Yield and Its Components in the Semi-Arid Zone of Setif

Authors: Cheniti Khalissa, Dekhili Mohamed

Abstract:

Several fungal diseases may infect hard and soft wheat, which directly affect the yield and thus the economy of the homeland. So, a treatment fungicide is one of means of diseases control. In this context, we studied two varieties of wheat; Waha for soft wheat and Hidhab for hard wheat, at the level of the Technical Institute of crops (ITGC) in the wilaya of Setif under semi-arid conditions. This study consists of a successive application of three fungicides (Tilt, Artea, and Armistarxtra) according to three treatments (T1, T2, and T3) in addition to the witness (T0) at different stages of plant development (respectively, Montaison, earing and after flowering) whose purpose is to test and determine the effectiveness of these products used sequentially. The study showed good efficacy when we use the sum of these pesticides The comparison between these different treatments indicates that the T3 treatment reduced yield losses significantly; which is evident in the main yield components such as fertility, grain yield and weight of 1000 grains. The various components of yield and final yield are all parameters to be taken into account in such a study. In general, the fungal treatment is an effective way of improving profitability. In general, the fungal treatment is an effective way of improving profitability and positioning interventions in time is one of the requirements for an appreciable efficiency.

Keywords: hard wheat, soft wheat, diseases, fungicide treatment, fertility, 1000-grain weight, semi-arid zone

Procedia PDF Downloads 400
4772 An Immune-Inspired Web Defense Architecture

Authors: Islam Khalil, Amr El-Kadi

Abstract:

With the increased use of web technologies, microservices, and Application Programming Interface (API) for integration between systems, and with the development of containerization of services on the operating system level as a method of isolating system execution and for easing the deployment and scaling of systems, there is a growing need as well as opportunities for providing platforms that improve the security of such services. In our work, we propose an architecture for a containerization platform that utilizes various concepts derived from the human immune system. The goal of the proposed containerization platform is to introduce the concept of slowing down or throttling suspected malicious digital pathogens (intrusions) to reduce their damage footprint while providing more opportunities for forensic inspection of suspected pathogens in addition to the ability to snapshot, rollback, and recover from possible damage. The proposed platform also leverages existing intrusion detection algorithms by integrating and orchestrating their cooperative operation for more effective intrusion detection. We show how this model reduces the damage footprint of intrusions and gives a greater time window for forensic investigation. Moreover, during our experiments, our proposed platform was able to uncover unintentional system design flaws that resulted in internal DDoS-like attacks by submodules of the system itself rather than external intrusions.

Keywords: containers, human immunity, intrusion detection, security, web services

Procedia PDF Downloads 87
4771 Optimal Allocation of Oil Rents and Public Investment In Low-Income Developing Countries: A Computable General Equilibrium Analysis

Authors: Paule Olivia Akotto

Abstract:

The recent literature suggests spending between 50%-85% of oil rents. However, there are not yet clear guidelines for allocating this windfall in the public investment system, while most of the resource-rich countries fail to improve their intergenerational mobility. We study a design of the optimal spending system in Senegal, a low-income developing country featuring newly discovered oil fields and low intergenerational mobility. We build a dynamic general equilibrium model in which rural and urban (Dakar and other urban centers henceforth OUC) households face different health, education, and employment opportunities based on their location, affecting their intergenerational mobility. The model captures the relationship between oil rents, public investment, and multidimensional inequality of opportunity. The government invests oil rents in three broad sectors: health and education, road and industries, and agriculture. Through endogenous productivity externality and human capital accumulation, our model generates the predominant position of Dakar and OUC households in terms of access to health, education, and employment in line with Senegal data. Rural households are worse off in all dimensions. We compute the optimal spending policy under two sets of simulation scenarios. Under the current Senegal public investment strategy, which weighs more health and education investments, we find that the reform maximizing the decline in inequality of opportunity between households, frontloads investment during the first eight years of the oil exploitation and spends the perpetual value of oil wealth thereafter. We will then identify the marginal winners and losers associated with this policy and its redistributive implications. Under our second set of scenarios, we will test whether the Senegalese economy can reach better equality of opportunity outcomes under this frontloading reform, by allowing the sectoral shares of investment to vary. The trade-off will be between cutting human capital investment in favor of agricultural and productive infrastructure or increasing the former. We will characterize the optimal policy by specifying where the higher weight should be. We expect that the optimal policy of the second set strictly dominates in terms of equality of opportunity, the optimal policy computed under the current investment strategy. Finally, we will quantify this optimal policy's aggregate and distributional effects on poverty, well-being, and gender earning gaps.

Keywords: developing countries, general equilibrium, inequality of opportunity, oil rents

Procedia PDF Downloads 229
4770 Infestations of Olive Fruit Fly, Bactrocera oleae (Rossi) (Diptera: Tephritidae), in Different Olive Cultivars in Çanakkale, Turkey

Authors: Hanife Genç

Abstract:

The olive fruit fly, Bactrocera oleae (Rossi), is an economically important and endemic pest in olive (Oleae europae) orchards in Turkey. The aim of this study was to determine olive fruit fly infestation in different olive cultivars in the laboratory. Olive fly infested fruits were collected in Çanakkale province to establish wild fly population. After having reproductive olive fly colonies, 14 olive cultivars were tested in the controlled laboratory conditions, at 23±2 °C, 65% RH and 16:8 h (light: dark) photoperiod. The olive samples from 14 different olive cultivars were collected in October 2015, in Campus of Dardanos, Çanakkale Onsekiz Mart University. Observations were carried out detecting some biological parameters such as the number of oviposition stings, active infestation, total infestation, the number of pupae and the adult emergence. The results indicated that oviposition stings were not associated with pupal yield. A few pupae were found within olive fruits which were not able to exit. Screening of the varieties suggested that less susceptible cultivar to olive fruit fly attacks was Arbequin while Gemlik-2M 2/3 showed significant susceptibility. Ovipositional preference of olive fly females and the success of larval development in different olive varieties are crucial for establishing new olive orchards to prevent high olive fruit fly infestation.

Keywords: infestation, olive fruit fly, olive cultivars, oviposition sting

Procedia PDF Downloads 210
4769 Q-Efficient Solutions of Vector Optimization via Algebraic Concepts

Authors: Elham Kiyani

Abstract:

In this paper, we first introduce the concept of Q-efficient solutions in a real linear space not necessarily endowed with a topology, where Q is some nonempty (not necessarily convex) set. We also used the scalarization technique including the Gerstewitz function generated by a nonconvex set to characterize these Q-efficient solutions. The algebraic concepts of interior and closure are useful to study optimization problems without topology. Studying nonconvex vector optimization is valuable since topological interior is equal to algebraic interior for a convex cone. So, we use the algebraic concepts of interior and closure to define Q-weak efficient solutions and Q-Henig proper efficient solutions of set-valued optimization problems, where Q is not a convex cone. Optimization problems with set-valued maps have a wide range of applications, so it is expected that there will be a useful analytical tool in optimization theory for set-valued maps. These kind of optimization problems are closely related to stochastic programming, control theory, and economic theory. The paper focus on nonconvex problems, the results are obtained by assuming generalized non-convexity assumptions on the data of the problem. In convex problems, main mathematical tools are convex separation theorems, alternative theorems, and algebraic counterparts of some usual topological concepts, while in nonconvex problems, we need a nonconvex separation function. Thus, we consider the Gerstewitz function generated by a general set in a real linear space and re-examine its properties in the more general setting. A useful approach for solving a vector problem is to reduce it to a scalar problem. In general, scalarization means the replacement of a vector optimization problem by a suitable scalar problem which tends to be an optimization problem with a real valued objective function. The Gerstewitz function is well known and widely used in optimization as the basis of the scalarization. The essential properties of the Gerstewitz function, which are well known in the topological framework, are studied by using algebraic counterparts rather than the topological concepts of interior and closure. Therefore, properties of the Gerstewitz function, when it takes values just in a real linear space are studied, and we use it to characterize Q-efficient solutions of vector problems whose image space is not endowed with any particular topology. Therefore, we deal with a constrained vector optimization problem in a real linear space without assuming any topology, and also Q-weak efficient and Q-proper efficient solutions in the senses of Henig are defined. Moreover, by means of the Gerstewitz function, we provide some necessary and sufficient optimality conditions for set-valued vector optimization problems.

Keywords: algebraic interior, Gerstewitz function, vector closure, vector optimization

Procedia PDF Downloads 210
4768 Modification Encryption Time and Permutation in Advanced Encryption Standard Algorithm

Authors: Dalal N. Hammod, Ekhlas K. Gbashi

Abstract:

Today, cryptography is used in many applications to achieve high security in data transmission and in real-time communications. AES has long gained global acceptance and is used for securing sensitive data in various industries but has suffered from slow processing and take a large time to transfer data. This paper suggests a method to enhance Advance Encryption Standard (AES) Algorithm based on time and permutation. The suggested method (MAES) is based on modifying the SubByte and ShiftRrows in the encryption part and modification the InvSubByte and InvShiftRows in the decryption part. After the implementation of the proposal and testing the results, the Modified AES achieved good results in accomplishing the communication with high performance criteria in terms of randomness, encryption time, storage space, and avalanche effects. The proposed method has good randomness to ciphertext because this method passed NIST statistical tests against attacks; also, (MAES) reduced the encryption time by (10 %) than the time of the original AES; therefore, the modified AES is faster than the original AES. Also, the proposed method showed good results in memory utilization where the value is (54.36) for the MAES, but the value for the original AES is (66.23). Also, the avalanche effects used for calculating diffusion property are (52.08%) for the modified AES and (51.82%) percentage for the original AES.

Keywords: modified AES, randomness test, encryption time, avalanche effects

Procedia PDF Downloads 236
4767 Social Media as a Source of Radicalization; A Case Study of Pakistan

Authors: Manam Hanfi

Abstract:

Pakistan is a victim of terrorism since 9/11 attacks. Since then it is a home for violence and extremism. One of the major reasons behind rising violence and extremism in Pakistan is radicalization. Pakistan has seen and suffered from the modification of terrorism from old to new. In new terrorism, the terrorist organizations incorporated internet to disseminate propaganda, to recruit and train people. The study focuses on the relationship between Pakistan and new terrorism and examines how the internet is being used by terrorist organizations. The study investigates radicalization through social media by terrorist organizations in Pakistan with the help of case studies. The study suggests five ways to counter radicalization, including, counter narrative on social media, content analysis of the data on the internet, curriculum and madrassa reforms, teaching peace education in the educational institutions and use of technical software such as eGLYPH to quickly remove violent data from social media. Lastly, the research attempted to contribute in counter-radicalization by combining the media dependency model and ideas for counter-radicalization. The dependency model elaborates the impact of mass media content on the audience. If media dependency is high, it will cause cognitive, affective and behavioral changes. In order to counter radicalization through social media, it is important to make cognitive, affective and behavioral changes with the help of counter-radicalization suggestions.

Keywords: counter radicalization, extremism, social media, terrorism

Procedia PDF Downloads 148
4766 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework

Authors: Abdulrahman S. Alqahtani

Abstract:

The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.

Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism

Procedia PDF Downloads 392
4765 Evaluating Mechanical Properties of CoNiCrAlY Coating from Miniature Specimen Testing at Elevated Temperature

Authors: W. Wen, G. Jackson, S. Maskill, D. G. McCartney, W. Sun

Abstract:

CoNiCrAlY alloys have been widely used as bond coats for thermal barrier coating (TBC) systems because of low cost, improved control of composition, and the feasibility to tailor the coatings microstructures. Coatings are in general very thin structures, and therefore it is impossible to characterize the mechanical responses of the materials via conventional mechanical testing methods. Due to this reason, miniature specimen testing methods, such as the small punch test technique, have been developed. This paper presents some of the recent research in evaluating the mechanical properties of the CoNiCrAlY coatings at room and high temperatures, through the use of small punch testing and the developed miniature specimen tensile testing, applicable to a range of temperature, to investigate the elastic-plastic and creep behavior as well as ductile-brittle transition temperature (DBTT) behavior. An inverse procedure was developed to derive the mechanical properties from such tests for the coating materials. A two-layer specimen test method is also described. The key findings include: 1) the temperature-dependent coating properties can be accurately determined by the miniature tensile testing within a wide range of temperature; 2) consistent DBTTs can be identified by both the SPT and miniature tensile tests (~ 650 °C); and 3) the FE SPT modelling has shown good capability of simulating the early local cracking. In general, the temperature-dependent material behaviors of the CoNiCrAlY coating has been effectively characterized using miniature specimen testing and inverse method.

Keywords: NiCoCrAlY coatings, mechanical properties, DBTT, miniature specimen testing

Procedia PDF Downloads 154
4764 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network

Authors: Kamyar Fakhr, Roozbeh Salmani

Abstract:

Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.

Keywords: biometric system, convolutional neural network, cyber-attack, secure

Procedia PDF Downloads 211
4763 Exploring the Need to Study the Efficacy of VR Training Compared to Traditional Cybersecurity Training

Authors: Shaila Rana, Wasim Alhamdani

Abstract:

Effective cybersecurity training is of the utmost importance, given the plethora of attacks that continue to increase in complexity and ubiquity. VR cybersecurity training remains a starkly understudied discipline. Studies that evaluated the effectiveness of VR cybersecurity training over traditional methods are required. An engaging and interactive platform can support knowledge retention of the training material. Consequently, an effective form of cybersecurity training is required to support a culture of cybersecurity awareness. Measurements of effectiveness varied throughout the studies, with surveys and observations being the two most utilized forms of evaluating effectiveness. Further research is needed to evaluate the effectiveness of VR cybersecurity training and traditional training. Additionally, research for evaluating if VR cybersecurity training is more effective than traditional methods is vital. This paper proposes a methodology to compare the two cybersecurity training methods and their effectiveness. The proposed framework includes developing both VR and traditional cybersecurity training methods and delivering them to at least 100 users. A quiz along with a survey will be administered and statistically analyzed to determine if there is a difference in knowledge retention and user satisfaction. The aim of this paper is to bring attention to the need to study VR cybersecurity training and its effectiveness compared to traditional training methods. This paper hopes to contribute to the cybersecurity training field by providing an effective way to train users for security awareness. If VR training is deemed more effective, this could create a new direction for cybersecurity training practices.

Keywords: virtual reality cybersecurity training, VR cybersecurity training, traditional cybersecurity training

Procedia PDF Downloads 206
4762 The Impact of Entrepreneurship Education on the Entrepreneurial Tendencies of Students: A Quasi-Experimental Design

Authors: Lamia Emam

Abstract:

The attractiveness of entrepreneurship education stems from its perceived value as a venue through which students can develop an entrepreneurial mindset, skill set, and practice, which may not necessarily lead to them starting a new business, but could, more importantly, be manifested as a life skill that could be applied to all types of organizations and career endeavors. This, in turn, raises important questions about what happens in our classrooms; our role as educators, the role of students, center of learning, and the instructional approach; all of which eventually contribute to achieving the desired EE outcomes. With application to an undergraduate entrepreneurship course -Entrepreneurship as Practice- the current paper aims to explore the effect of entrepreneurship education on the development of students’ general entrepreneurial tendencies. Towards that purpose, the researcher herein uses a pre-test and post-test quasi-experimental research design where the Durham University General Enterprising Tendency Test (GET2) is administered to the same group of students before and after course delivery. As designed and delivered, the Entrepreneurship as Practice module is a highly applied and experiential course where students are required to develop an idea for a start-up while practicing the entrepreneurship-related knowledge, mindset, and skills that are taught in class, both individually and in groups. The course is delivered using a combination of short lectures, readings, group discussions, case analysis, guest speakers, and, more importantly, actively engaging in a series of activities that are inspired by diverse methods for developing successful and innovative business ideas, including design thinking, lean-start up and business feasibility analysis. The instructional approach of the course particularly aims at developing the students' critical thinking, reflective, analytical, and creativity-based problem-solving skills that are needed to launch one’s own start-up. The analysis and interpretation of the experiment’s outcomes shall simultaneously incorporate the views of both the educator and students. As presented, the study responds to the rising call for the application of experimental designs in entrepreneurship in general and EE in particular. While doing so, the paper presents an educator’s perspective of EE to complement the dominant stream of research which is constrained to the students’ point of view. Finally, the study sheds light on EE in the MENA region, where the study is applied.

Keywords: entrepreneurship education, andragogy and heutagogy, scholarship of teaching and learning, experiment

Procedia PDF Downloads 114
4761 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology

Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar

Abstract:

The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.

Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology

Procedia PDF Downloads 111
4760 Quality of Life of Health Professionals during the COVID-19 Pandemic

Authors: Elucir Gir, Myllena Nilce de Freitas Surmano, Laelson Rochelle Milanês Sousa, Mayra Gonçalves Menegueti, Ana Cristina de Oliveira E Silva, Renata Karina Reis

Abstract:

Objective: To analyze the factors associated with the worsening of the quality of life of health professionals in the Southeast region of Brazil during the COVID-19 pandemic and its associated factors. Method: Analytical cross-sectional study carried out with health professionals from the southeastern region of Brazil. Data collection took place through an online survey with a form stored on the Survey Monkey platform. Bivariate analysis was used, and the chi-square test was adopted, followed by the multiple binary logistic regression model based on the stepwise method. Results: 3,493 health professionals participated in the study. Factors associated with worsening quality of life were: Professional Category (Nursing assistant) [OR 1.851 (95%CI 1.035-3.311) p= 0.038]; types of people who provided care (people in general) [OR 1.445 (95%CI 1.072-1.945) p=0.015]; Supply of good quality PPE by the institution where he works (no) [OR 1.595 (CI 95% 1.144-2.223) p= 0.006] and Supply of good quality PPE by the institution where he works (in part) [OR 1.563 (CI 95% 1.257-1.943) p < 0.001]. Conclusion: The factors associated with the worsening of the quality of life of health professionals during the COVID-19 pandemic were: Professional Category (Nursing assistant); types of people who provided assistance (people in general); Supply of sufficient PPE by the institution where you work (no) and Supply of good quality PPE by the institution where you work (in part). Future studies should investigate to what extent QoL can be improved based on modifiable factors.

Keywords: COVID-19, quality of life, health professionals, respiratory infections

Procedia PDF Downloads 86
4759 Multiscale Model of Blast Explosion Human Injury Biomechanics

Authors: Raj K. Gupta, X. Gary Tan, Andrzej Przekwas

Abstract:

Bomb blasts from Improvised Explosive Devices (IEDs) account for vast majority of terrorist attacks worldwide. Injuries caused by IEDs result from a combination of the primary blast wave, penetrating fragments, and human body accelerations and impacts. This paper presents a multiscale computational model of coupled blast physics, whole human body biodynamics and injury biomechanics of sensitive organs. The disparity of the involved space- and time-scales is used to conduct sequential modeling of an IED explosion event, CFD simulation of blast loads on the human body and FEM modeling of body biodynamics and injury biomechanics. The paper presents simulation results for blast-induced brain injury coupling macro-scale brain biomechanics and micro-scale response of sensitive neuro-axonal structures. Validation results on animal models and physical surrogates are discussed. Results of our model can be used to 'replicate' filed blast loadings in laboratory controlled experiments using animal models and in vitro neuro-cultures.

Keywords: blast waves, improvised explosive devices, injury biomechanics, mathematical models, traumatic brain injury

Procedia PDF Downloads 245
4758 Convergence and Stability in Federated Learning with Adaptive Differential Privacy Preservation

Authors: Rizwan Rizwan

Abstract:

This paper provides an overview of Federated Learning (FL) and its application in enhancing data security, privacy, and efficiency. FL utilizes three distinct architectures to ensure privacy is never compromised. It involves training individual edge devices and aggregating their models on a server without sharing raw data. This approach not only provides secure models without data sharing but also offers a highly efficient privacy--preserving solution with improved security and data access. Also we discusses various frameworks used in FL and its integration with machine learning, deep learning, and data mining. In order to address the challenges of multi--party collaborative modeling scenarios, a brief review FL scheme combined with an adaptive gradient descent strategy and differential privacy mechanism. The adaptive learning rate algorithm adjusts the gradient descent process to avoid issues such as model overfitting and fluctuations, thereby enhancing modeling efficiency and performance in multi-party computation scenarios. Additionally, to cater to ultra-large-scale distributed secure computing, the research introduces a differential privacy mechanism that defends against various background knowledge attacks.

Keywords: federated learning, differential privacy, gradient descent strategy, convergence, stability, threats

Procedia PDF Downloads 19
4757 Intervening between Family Functioning and Depressive Symptoms: Effect of Deprivation of Liberty, Self-Efficacy and Differentiation of Self

Authors: Jasna Hrncic

Abstract:

Poor family relations predict depression, but also to other mental health issues. Mediating effect of self-efficacy and differentiation of self and moderating effect of decreased accessibility and/or success of other adaptive and defensive mechanisms for overcoming social disadvantages could explain depression as a specific outcome of dysfunctional family relations. The present study analyzes the mediation effect of self-efficacy and differentiation of self from poor family functioning to depressive symptoms and the moderation effect of deprivation of liberty on the listed mediation effect. Deprivation of liberty has, as a general consequence, a decreased accessibility and/or success of many adaptive and defensive mechanisms. It is hypothesized that: 1) self-efficacy and differentiation of self will mediate between family functioning and depressiveness in the total sample, and 2) deprivation of liberty will moderate the stated relations. Cross-sectional study was conducted among 323 male juveniles in Serbia divided in three groups: 98 adolescents deprived of their liberty due to antisocial behavior (incarcerated antisocial group - IAG), 121 adolescents with antisocial behavior in their natural setting (antisocial control group - CAG) and 105 adolescents in general population (general control group - CGG). The CAG was included along with GCG to control the possible influence that comorbidity of antisocial behavior and depressiveness could have on results. Instruments for family relations assessment were: for a whole family of origin the emotional exchange scale and individuation scale from GRADIR by Knezevic, and for a relationship with mother PCS-YSR and CRPBI by barber, and intimacy, rejection, sacrifice, punishment, demands, control and internal control by Opacic and Kos. Differentiation of self (DOS) is measured by emotional self scale (Opacic), self-efficacy (SE) by general incompetence scale by Bezinovic, and depression by BDI (Back), CES-D (Radloff) and D6R (Momirovic). Two-path structural equation modeling based on most commonly reported fit indices, showed that the mediation model had unfavorable fit to our data for total sample [(χ2 (1, N = 324) = 13.73); RMSEA= .20 (90% CI= [.12, .30]); CFI= .98; NFI= .97; AIC=31.73]. Path model provided an adequate fit to the data only for AIG - and not to the data from ACG and GCG. SE and DOS mediated the relationship between PFF and depressiveness. Test of the indirect effects revealed that 23.85% of PFF influences on depressiveness is mediated by these two mediators (the quotient of mediated effect = .24). Test of specific indirect effects showed that SE mediates 22.17%, while DOS mediates 1.67% of PFF influence on depressiveness. Lack of expected mediation effect could be explained by missing other potential mediators (i.e., relationship with that father, social skills, self-esteem) and lower variability of both predictor and criterion variable due to their low levels on the whole sample and on control subsamples. Results suggested that inaccessibility and/or successfulness of other adaptive and defensive mechanisms for overcoming social disadvantages has a strong impact on the mediation effect of self/efficacy and differentiation of self from poor family functioning to depressive symptoms. Further researches could include other potential mediators and a sample of clinically depressed people.

Keywords: antisocial behavior, mediating effect, moderating effect, natural setting, incarceration

Procedia PDF Downloads 112
4756 Structural Performance of Prefabricated Concrete and Reinforced Concrete Structural Walls under Blast Loads

Authors: S. Kamil Akin, Turgut Acikara

Abstract:

In recent years the world and our country has experienced several explosion events occurred due to terrorist attacks and accidents. In these explosion events many people have lost their lives and many buildings have been damaged. If structures were designed taking the blast loads into account, these results may not have happened or the casualties would have been less. In this thesis analysis of the protection walls have been conducted to prevent the building damage from blast loads. These analyzes was carried out for two different types of wall, concrete and reinforced concrete. Analyses were carried out on four different thicknesses of each wall element. In each wall element the stresses and displacements of the exposed surface due to the detonation charge has been calculated. The limit shear stress and displacement of the wall element according to their material properties has been taken into account. As the result of the analyses the standoff distances and TNT equivalent amount has been determined. According to equivalent TNT amounts and standoff distances the structural response of the protective wall elements has been observed. These structural responses have been observed by ABAQUS finite element package. Explosion loads were brought into effect to the protective wall element models by using the ABAQUS / CONWEP.

Keywords: blast loading, blast wave, TNT equivalent method, CONWEP, finite element analysis, detonation

Procedia PDF Downloads 431
4755 Research Trends in Fine Arts Education Dissertations in Turkey

Authors: Suzan Duygu Bedir Erişti

Abstract:

The present study tried to make a general evaluation of the dissertations conducted in the last decade in the field of art education in the Department of Fine Arts Education in the Institutes of Education Sciences in Turkey. In the study, most of the universities which involved an Institute of Education Sciences within their bodies in Turkey were reached. As a result, a total of a hundred dissertations conducted in the departments of Fine Arts Education at several universities (Anadolu, Gazi, Ankara, Marmara, Dokuz Eylul, Ondokuz Mayıs, Selcuk and Necmettin Erbakan) were determined via the open access systems of universities as well as via the Thesis Search System of Higher Education Council. Most of the dissertations were reached via the latter system, and in cases of failure, the dissertations were reached via the former system. Consequently, most of the dissertations which did not have any access restriction and which had appropriate content were reached. The dissertations reached were examined based on document analysis in terms of their research topics, research paradigms, contents, purposes, methodologies, data collection tools, and analysis techniques. The dissertations conducted in institutes of Education Sciences could be said to have demonstrated a development, especially in recent years with respect to their qualities. It was also found that a great majority of the dissertations were carried out at Gazi University and Marmara University and that a similar number of dissertations were conducted in other universities. When all the dissertations were taken into account, in general, they were found to differ a lot in their subject areas. In most of the dissertations, the quantitative paradigm was adopted, while especially in recent years, more importance has been given to methods based on the qualitative paradigm. In addition, most of the dissertations conducted with quantitative paradigm were structured based on the general survey model and experimental research model. In terms of statistical techniques, university-focused approaches were used. In some universities, advanced statistical techniques were applied, while in some other universities, there was a moderate use of statistical techniques. Most of the studies produced results generalizable to the levels of postgraduate education and elementary school education. The studies were generally structured in face-to-face teaching processes, while some of them were designed in environments which did not include results generalizable to the face-to-face education system. In the present study, it was seen that the dissertations conducted in the departments of Fine Arts Education at the Institutes of Education Sciences in Turkey did not involve application-based approaches which included art-based or visual research in terms of either research topic or methodology.

Keywords: fine arts education, dissertations, evaluation of dissertations, research trends in fine arts education

Procedia PDF Downloads 193
4754 Intonation Salience as an Underframe to Text Intonation Models

Authors: Tatiana Stanchuliak

Abstract:

It is common knowledge that intonation is not laid over a ready text. On the contrary, intonation forms and accompanies the text on the level of its birth in the speaker’s mind. As a result, intonation plays one of the fundamental roles in the process of transferring a thought into external speech. Intonation structure can highlight the semantic significance of textual elements and become a ranging mark in understanding the information structure of the text. Intonation functions by means of prosodic characteristics, one of which is intonation salience, whose function in texts results in making some textual elements more prominent than others. This function of intonation, therefore, performs as organizing. It helps to form the frame of key elements of the text. The study under consideration made an attempt to look into the inner nature of salience and create a sort of a text intonation model. This general goal brought to some more specific intermediate results. First, there were established degrees of salience on the level of the smallest semantic element - intonation group, as well as prosodic means of creating salience, were examined. Second, the most frequent combinations of prosodic means made it possible to distinguish patterns of salience, which then became constituent elements of a text intonation model. Third, the analysis of the predicate structure allowed to divide the whole text into smaller parts, or units, which performed a specific function in the developing of the general communicative intention. It appeared that such units can be found in any text and they have common characteristics of their intonation arrangement. These findings are certainly very important both for the theory of intonation and their practical application.

Keywords: accentuation , inner speech, intention, intonation, intonation functions, models, patterns, predicate, salience, semantics, sentence stress, text

Procedia PDF Downloads 262
4753 Environmental and Health Risks Associated with Dental Waste Management: A Review

Authors: Y. Y. Babanyara, B. A. Gana, T. Garba, M. A. Batari

Abstract:

Proper management of dental waste is a crucial issue for maintaining human health and the environment. The waste generated in the dental clinics has the potential for spreading infections and causing diseases, so improper disposal of these dental wastes can cause harm to the dentist, the people in immediate vicinity of the dentist, waste handlers, general public and the environment through production of toxins or as by-products of the destruction process. Staff that provide dental healthcare ought to be aware of the proper handling and the system of management of dental waste used by different dental hospitals. The method of investigation adopted in the paper involved a desk study in which documents and records relating to dental waste handling were studied to obtain background information on existing dental waste management in Nigeria other countries of the world are also mentioned as examples. Additionally, information on generation, handling, segregation, risk associated during handling and treatment of dental medical waste were sought in order to determine the best method for safe disposal. This article provides dentists with the information they need to properly dispose of mercury and amalgam waste, and provides suggestions for managing the other wastes that result from the day-to-day activities of a dental office such as: used X-ray fixers and developers; cleaners for X-ray developer systems; lead foils, shields and aprons; chemiclave/chemical sterilant solutions; disinfectants, cleaners, and other chemicals; and, general office waste. Additionally, this study may be beneficial for authorities and researchers of developing countries to work towards improving their present dental waste management system.

Keywords: clinic, dental, disposal, environment, waste management

Procedia PDF Downloads 314