Search results for: self defense
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 447

Search results for: self defense

387 Money Laundering and Financing of Terrorism

Authors: Covadonga Mallada Fernández

Abstract:

Economic development and globalization of international markets have created a favourable atmosphere for the emergence of new forms of crime such as money laundering or financing of terrorism, which may contribute to destabilized and damage economic systems. In particular, money laundering have acquired great importance since the 11S attacks, what has caused on the one hand, the establishment and development of preventive measures and, on the other hand, a progressive hardening of penal measures. Since then, the regulations imposed to fight against money laundering have been viewed as key components also in the fight against terrorist financing. Terrorism, at the beginning, was a “national” crime connected with internal problems of the State (for instance the RAF in Germany or ETA in Spain) but in the last 20 years has started to be an international problem that is connected with the defence and security of the States. Therefore, the new strategic concept for the defense and security of NATO has a comprehensive list of security threats to the Alliance, such as terrorism, international instability, money laundering or attacks on cyberspace, among others. With this new concept, money laundering and terrorism has become a priority in the national defense. In this work we will analyze the methods to combat these new threats to the national security. We will study the preventive legislations to combat money laundering and financing of terrorism, the UIF that exchange information between States, and the hawala-Banking.

Keywords: control of financial flows, money laundering, terrorism, financing of terrorism

Procedia PDF Downloads 454
386 Defence Industry in the Political Economy of State and Business Relations

Authors: Hatice Idil Gorgen

Abstract:

Turkey has been investing in its national defence industrial base since the 1980s. State’s role in defence industry showed differences in Turkey. Parallel with this, ruling group’s attitude toward companies in defence sector varied. These changes in policies and behaviors of the state have occurred throughout such milestones as political and economic turmoil in domestic and international level. Hence, it is argued that state’s role, relations with private companies in defense sector and its policies towards the defense industry has shown differences due to the international system, political institutions, ideas and political coalitions in Turkey since the 1980s. Therefore, in order to see changes in the role of the state in defence sector, this paper aims to indicate first, history of state’s role in production and defence industry in the post-1980s era. Secondly, to comprehend the changes in the state’s role in defence industry, Stephan Haggard’s sources of policy change will be provided in the theoretical ground. Thirdly, state cooperated, and joint venture defence firms, state’s actions toward them will be observed. The remaining part will explore the underlying reasons for the changes in the role of the state in defence industry, and it implicitly or explicitly impacts on state business relations. Major findings illustrate that targeted idea of self-sufficient or autarky Turkey to attract domestic audience and to raise the prestige through defence system; ruling elites can regard defence industry and involved business groups as a mean for their ends. State dominant value, sensitive perception which has been ever since Ottoman Empire, prioritizes business groups in defence industry compared to others and push the ruling elites to pursue hard power in defence sectors. Through the globally structural transformation in defence industry, integration of Turkey to liberal bloc deepened and widened interdependence among states. Although it is a qualitative study, it involves the numerated data and descriptive statistics. Data will be collected by searching secondary sources from the literature, examining official documents of ministry of defence, and other appropriate ministries.

Keywords: defense industry, state and business relations, public private relations, arm industry

Procedia PDF Downloads 315
385 Enzymatic Activities of Two Iranian Wheat Cultivars Infected with Fusarium Culmorum

Authors: Parastoo Motallebi, Vahid Niknam, Hassan Ebrahimzadeh, Majid Hashemi

Abstract:

Wheat, the most strategically important worldwide crop, is widely grown in various countries. Based on international wheat production statistics (FAOSTAT database), the total production of wheat in 2012 was 13.8 in Iran. Fusarium culmorum is one of the principal causative agents of Fusarium crown rot (FCR), an overwhelming disease of wheat and barley which is in the early stages causing yield losses, stand reductions and rotting of root and lower stem tissues. In this study inoculation of two wheat seedlings of the susceptible cultivar Falat and the partially field-resistant cultivar Pishtaz were carried out in greenhouse conditions and root samples were taken for 6 days. The activity of peroxidase (POX) and polyphenoloxidase (PPO) enzymes were analyzed to identify possible relations between resistance and enzymatic activities. Although the POX and PPO activities in both geno types increased, this significant increase was more dominant in Pishtaz. The results showed an earlier elevation in the activity of these defense related enzymes in semi-resistant cv. Pishtaz after inoculation, suggested that the activities of POX and PPO in wheat geno types play an important role in the induction of resistance to this disease.

Keywords: Defense responses, Fusarium culmorum, Wheat

Procedia PDF Downloads 539
384 Using the Structural Equation Model to Explain the Effect of Supervisory Practices on Regulatory Density

Authors: Jill Round

Abstract:

In the economic system, the financial sector plays a crucial role as an intermediary between market participants, other financial institutions, and customers. Financial institutions such as banks have to make decisions to satisfy the demands of all the participants by keeping abreast of regulatory change. In recent years, progress has been made regarding frameworks, development of rules, standards, and processes to manage risks in the banking sector. The increasing focus of regulators and policymakers placed on risk management, corporate governance, and the organization’s culture is of special interest as it requires a well-resourced risk controlling function, compliance function, and internal audit function. In the past years, the relevance of these functions that make up the so-called Three Lines of Defense has moved from the backroom to the boardroom. The approach of the model can vary based on the various organizational characteristics. Due to the intense regulatory requirements, organizations operating in the financial sector have more mature models. In less regulated industries there is more cloudiness about what tasks are allocated where. All parties strive to achieve their objectives through the effective management of risks and serve the identical stakeholders. Today, the Three Lines of Defense model is used throughout the world. The research looks at trends and emerging issues in the professions of the Three Lines of Defense within the banking sector. The answers are believed to helping to explain the increasing regulatory requirements for the banking sector. While the number of supervisory practices increases the risk management requirements intensify and demand more regulatory compliance at the same time. The Structural Equation Modeling (SEM) is applied by making use of conducted surveys in the research field. It aims to describe (i) the theoretical model regarding the applicable linearity relationships, (ii) the causal relationship between multiple predictors (exogenous) and multiple dependent variables (endogenous), (iii) taking into consideration the unobservable variables and (iv) the measurement errors. The surveys conducted on the research field suggest that the observable variables are caused by various latent variables. The SEM consists of the 1) measurement model and the 2) structural model. There is a detectable correlation regarding the cause-effect relationship among the performed supervisory practices and the increasing scope of regulation. Supervisory practices reinforce the regulatory density. In the past, controls were placed after supervisory practices were conducted or incidents occurred. In further research, it is of interest to examine, whether risk management is proactive, reactive to incidents and supervisory practices or can be both at the same time.

Keywords: risk management, structural equation model, supervisory practice, three lines of defense

Procedia PDF Downloads 223
383 Design and Implementation Guidance System of Guided Rocket RKX-200 Using Optimal Guidance Law

Authors: Amalia Sholihati, Bambang Riyanto Trilaksono

Abstract:

As an island nation, is a necessity for the Republic of Indonesia to have a capable military defense on land, sea or air that the development of military weapons such as rockets for air defense becomes very important. RKX rocket-200 is one of the guided missiles which are developed by consortium Indonesia and coordinated by LAPAN that serve to intercept the target. RKX-200 is designed to have the speed of Mach 0.5-0.9. RKX rocket-200 belongs to the category two-stage rocket that control is carried out on the second stage when the rocket has separated from the booster. The requirement for better performance to intercept missiles with higher maneuverability continues to push optimal guidance law development, which is derived from non-linear equations. This research focused on the design and implementation of a guidance system based OGL on the rocket RKX-200 while considering the limitation of rockets such as aerodynamic rocket and actuator. Guided missile control system has three main parts, namely, guidance system, navigation system and autopilot systems. As for other parts such as navigation systems and other supporting simulated on MATLAB based on the results of previous studies. In addition to using the MATLAB simulation also conducted testing with hardware-based ARM TWR-K60D100M conjunction with a navigation system and nonlinear models in MATLAB using Hardware-in-the-Loop Simulation (HILS).

Keywords: RKX-200, guidance system, optimal guidance law, Hils

Procedia PDF Downloads 254
382 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare

Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon

Abstract:

This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.

Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty

Procedia PDF Downloads 357
381 Detection of Viral-Plant Interaction Using Some Pathogenesis Related Protein Genes to Identify Resistant Genes against Potato LeafRoll Virus and Potato Virus Y in Egyptian Isolates

Authors: Dalia. G. Aseel, E. E. Hafez, S. M. Hammad

Abstract:

Viral RNAs of both potato leaf roll virus (PLRV) and potato virus Y (PVY) were extracted from infected potato leaves collected from different Egyptian regions. Differential Display Polymerase Chain Reaction (DD-PCR) using (Endogluconase, β-1,3-glucanases, Chitinase, Peroxidase and Polyphenol oxidase) primers (forward strand) for was performed. The obtained data revealed different banding patterns depending on the viral type and the region of infection. Regarding PLRV, a 58 up regulated and 19 down regulated genes were detected, while, 31 up regulated and 14 down regulated genes were observed in case of PVY. Based on the nucleotide sequencing, variable phylogenetic relationships were reported for the three sequenced genes coding for: Induced stolen tip protein, Disease resistance RPP-like protein and non-specific lipid-transfer protein. In a complementary approach, using the quantitative Real-time PCR, the expressions of PRs genes understudy were estimated in the infected leaves by PLRV and PVY of three potato cultivars (Spunta, Diamont and Cara). The infection with both viruses inhibited the expressions of the five PRs genes. On the contrary, infected leaves by PLRV or PVY elevated the expression of some defense genes. This interaction also may be enhanced and/or inhibited the expression of some genes responsible for the plant defense mechanisms.

Keywords: PLRV, PVY, PR genes, DD-PCR, qRT-PCR, sequencing

Procedia PDF Downloads 338
380 The Effect of Artesunate on Myeloperoxidase Activity of Human Polymorphonuclear Neutrophil

Authors: J. B. Minari, O. B. Oloyede, A. A. Odutuga

Abstract:

Myeloperoxidase is the most abundant enzyme found in the polymorphonuclear neutrophil and is known to play a central role in the host defense system of the leukocyte. The enzyme has been reported to interact with some drugs to generate free radical which inhibits its activity. This study investigated the effects of artesunate on the activity of the enzyme and the subsequent effect on the host immune system. In investigating the effects of the drugs on myeloperoxidase, the influence of concentration, pH, partition ratio estimation and kinetics of inhibition were studied. This study showed that artesunate is concentration-dependent inhibitor of myeloperoxidase with an IC50 of 0.078mM. Partition ratio estimation showed that 60 enzymatic turnover cycles are required for complete inhibition of myeloperoxidase in the presence of artesunate. The influence of pH on the effect of artesunate on the enzyme showed least activity of myeloperoxidase at physiological pH. The kinetic inhibition studies showed that artesunate caused a competitive inhibition with an increase in the Km value from 0.12mM to 0.26mM and no effect on the Vmax value. The Ki value was estimated to be 2.5mM. The results obtained from this study show that artesunate is a potent inhibitor of myeloperoxidase and it is capable of inactivating the enzyme. It is considered that the inhibition of myeloperoxidase in the presence of artesunate as revealed in this study may partly explain the impairment of polymorphonuclear neutrophil and consequent reduction of the strength of the host defense system against secondary infections.

Keywords: myeloperoxidase, artesunate, inhibition, nuetrophill

Procedia PDF Downloads 365
379 Submarines Unmanned Vehicle for Underwater Exploration and Monitoring System in Indonesia

Authors: Nabila Dwi Agustin, Ria Septitis Mentari, Nugroho Adi Sasongko

Abstract:

Indonesia is experiencing a crisis in the development of defense equipment. Most of Indonesia's defense equipment must import its parts from other countries. Moreover, the area of Indonesia is 2/3 of its territory is the sea areas. For the protection of marine areas, Indonesia relies solely on submarines in monitoring conditions and whether or not intruders enter their territory. In fact, we know the submarine has a large size so that the expenses are getting bigger, the time it takes longer and needs a big maneuver to operate the submarine. Indeed, the submarine can only be operated for deeper seas. Many other countries enter the underwater world of Indonesia but Indonesia could not do anything due to the limitations of underwater monitoring system. At the same time, reconnaissance and monitor for shallow seas cannot be done by submarine. Equipment that can be used for surveillance of shallow underwater areas shall be made. This study reviewed the current research and development initiative of the submarine unmanned vehicle (SUV) or unmanned undersea vehicle (UUV) in Indonesia. This can explore underwater without the need for an operator to operate in it, but we can monitor it from a long distance. UUV has several advantages that size can be reduced as we desired, rechargeable ship batteries, has a detection sonar commonly found on a submarine and agile movement to detect at shallow sea depth. In the sonar sensors consisted of MEMS (Micro Electro Mechanical System), the sonar system runs more efficiently and effectively to monitor the target. UUV that has been developed will be very useful if the equipment is used around the outlying islands and outer from Indonesia especially the island frequented by foreign submarines without us know. The impact of this may not be felt now but it will allow foreign countries to attack Indonesia from within for the future. In addition, UUV needs to be equipped with a anti-radar system so that submarines of other countries crossing borders cannot detect it and Indonesia anti-submarine vessels can take further security measures. As the recommendation, Indonesia should take decisive steps in the state border rules, especially submarines of other countries that deliberately cross the borders of the state. This decisive action not only by word alone but also action as well. Indonesia government should show the strength and sovereignty as the entire society unites and applies the principle of universal peace.

Keywords: submarine unmanned vehicle, submarine, development of defense equipment, the border of Indonesia

Procedia PDF Downloads 146
378 On the Use of Machine Learning for Tamper Detection

Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode

Abstract:

The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.

Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT

Procedia PDF Downloads 153
377 Understanding the Basics of Information Security: An Act of Defense

Authors: Sharon Q. Yang, Robert J. Congleton

Abstract:

Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.

Keywords: cybercrimes, hacking technologies, higher education, information security, libraries

Procedia PDF Downloads 134
376 The Impact of Cognition and Communication on the Defense of Capital Murder Cases

Authors: Shameka Stanford

Abstract:

This presentation will discuss how cognitive and communication disorders in the areas of executive functioning, receptive and expressive language can impact the problem-solving and decision making of individuals with such impairments. More specifically, this presentation will discuss approaches the legal defense team of capital case lawyers can add to their experience when servicing individuals who have a history of educational decline, special education, and limited intervention and treatment. The objective of the research is to explore and identify the correlations between impaired executive function skills and decision making and competency for individuals facing death penalty charges. To conduct this research, experimental design, randomized sampling, qualitative analysis was employed. This research contributes to the legal and criminal justice system related to how they view, defend, and characterize, and judge individuals with documented cognitive and communication disorders who are eligible for capital case charges. More importantly, this research contributes to the increased ability of death penalty lawyers to successfully defend clients with a history of academic difficulty, special education, and documented disorders that impact educational progress and academic success.

Keywords: communication disorders, cognitive disorders, capital murder, death penalty, executive function

Procedia PDF Downloads 156
375 A Novel Protein Elicitor Extracted From Lecanicillium lecanii Induced Resistance Against Whitefly, Bemisia tabaci in Cotton

Authors: Yusuf Ali Abdulle, Azhar Uddin Keerio

Abstract:

Background: Protein elicitors play a key role in signaling or displaying plant defense mechanisms and emerging as vital tools for bio-control of insects. This study was aimed at the characterization of the novel protein elicitor isolated from entomopathogenic fungi Lecanicillium lecanii (V3) strain and its activity against Whitefly, Bemisia tabaci in cotton. The sequence of purified elicitor protein showed 100% similarity with hypothetical protein LEL_00878 [Cordyceps confragosa RCEF 1005], GenBank no (OAA81333.1). This novel protein elicitor has 253 amino acid residues and 762bp with a molecular mass of 29 kDa. The protein recombinant was expressed in Escherichia coli using pET‐28a (+) plasmid. Effects of purified novel protein elicitor on Bemisia tabaci were determined at three concentrations of protein (i.e., 58.32, 41.22, 35.41 μg mL⁻¹) on cotton plants and were exposed to newly molted adult B.tabaci. Bioassay results showed a significant effect of the exogenous application of novel protein elicitor on B. tabaci in cotton. In addition, the gene expression analysis found a significant up-regulation of the major genes associated with salicylic acid (SA) and jasmonic acid (JA) linked plant defense pathways in elicitor protein-treated plants. Our results suggested the potential application of a novel protein elicitor derived from Lecanicillium lecanii as a future bio-intensive controlling approach against the whitefly, Bemisia tabaci.

Keywords: resistance, Lecanicillium lecanii, secondary metabolites, whitefly

Procedia PDF Downloads 184
374 Effect of Aerobic Training with Coriandrum sativum Extract on Selection of Oxidative Stress Markers in Diabetic Rats

Authors: M. Golzade Gangraj, A. Abdi, N. ganji

Abstract:

Aim: The aim of this study was to evaluate the Effect of aerobic training with Coriandrum sativum extract on selection of oxidative stress markers in diabetic rats. Methods: The population of male Wistar rats is the Pasteur Institute. Forty rats were randomly selected as subjects. After moving the mouse in vitro and stay for a week in a cage for sustainability, were diabetic. Diabetes induced by injection STZ (55 mg per kg of body weight of mice) was performed. According blood glucose was randomly divided into four experimental groups (control, training, extract and training-extract). Extract group consumed 150 mg per kg of body weight per day coriander juice. Training group performed aerobic training (50-55% VO2max). Result: The results showed that aerobic exercise training and coriander seed extract caused a significant increase in total antioxidant; superoxide dismutase and catalase were significantly decreased malondialdehyde. Conclusion: the research findings can be stated that the exercise with coriander seed extract has the ability to inhibit free radicals and can have beneficial effects on the body's antioxidant defense system and reduce oxidative stress in diabetic rats with STZ. Because it improves the body's antioxidant defense by increasing serum levels of antioxidant enzymes.

Keywords: aerobic training, coriandrum sativum, antioxidant, diabetes

Procedia PDF Downloads 513
373 The Ocean at the Center of Geopolitics: Between an Overflowing Land and an Under-Exploited Sea

Authors: Ana Maria De Azevedo

Abstract:

We are living a remarkable period, responsible for the thriving of the human population to unprecedented levels. Still, it is empirically obvious that sustaining such a huge population puts a tremendous pressure on our planet. Once Land resources grow scarcer, there is a mounting pressure to find alternatives to support basic human needs elsewhere. Occupying most of our planet, it’s therefore natural that, is not a so distant future, humankind look for such basic subsistence means at the Ocean. Thus, once the Ocean becomes essential to Human subsistence, it is predictable it's moving to the foreground of Geopolitics. Both future technologies and uses of the Ocean, as bidding for the exploration of its resources away from the natural territory of influence of a Country, are susceptible of raising the risk of conflict between traditional political adversaries and/or the dilemma of having to balance economic interests, with various security and defense concerns. Those empirical observations suggest the need to further research on this perspective shift of the main Geopolitical axis to the Ocean, the new sources of conflict that can result thereon, and how to address them. The author suggests a systematic analysis of this problematic, to attain a political and legal international consensus, namely on what concerns updating of the 'United Nations Convention on the Law of the Sea' of 10 December 1982, and/or its annexes. To proceed with the present research, the primary analysis was based on a quantitative observation, but reasoning thereon relied essentially on a qualitative process of prospective scenarios assessment.

Keywords: marine resources, ocean geopolitics, security and defense, sustainable development

Procedia PDF Downloads 154
372 Research Methods and Design Strategies to Improve Resilience in Coastal and Estuary Cities

Authors: Irene Perez Lopez

Abstract:

Delta and estuary cities are spaces constantly evolving, incessantly altered by the ever-changing actions of water transformation. Strategies that incorporate comprehensive and integrated approaches to planning and design with water will play a powerful role in defining new types of flood defense. These strategies will encourage more resilient and active urban environments, allowing for new spatial and functional programs. This abstract presents the undergoing research in Newcastle, the first urbanized delta in New South Wales (Australia), and the region's second-biggest catchment and estuary. The research methodology is organized in three phases: 1) a projective cartography that analyses maps and data across the region's recorded history, identifying past and present constraints, and predicting future conditions. The cartography aids to identify worst-case scenarios, revealing the implications of land reclamation that have not considered the confronting evolution of climate change and its conflicts with inhabitation; 2) the cartographic studies identify the areas under threat and form the basis for further interdisciplinary research, complimented by community consultation, to reduce flood risk and increase urban resilience and livability; 3) a speculative or prospective phase of design with water to generate evidence-based guidelines that strengthen urban resilience of shorelines and flood prone areas.

Keywords: coastal defense, design, urban resilience, mapping

Procedia PDF Downloads 132
371 The Impact of a Five-Day Basic Disaster Management Training on Disaster Risk Reduction: Case Study of Indonesia Defense University

Authors: Jazmi Adlan Bohari, I. Dewa Ketut Kerta Widana

Abstract:

Education on disaster management has been made as a mainstream focus of many countries. In Indonesia, this has been emphasized with the direct order of the President of Indonesia to implement disaster education at all levels in both formal and informal education. Indonesia Defense University (IDU) executes this order through Three Pillars of Higher Education, which consists of research, education, and community service. One of them is a five-day disaster management training for 105 participants divided into three batches that consist of faculty members and graduate students. This training uses the 2018 Basic Disaster Management Training Modul issued by the Indonesia National Disaster Management Agency (BNPB). This research aims to analyze the impact of this short training on the trainee’s knowledge and understanding of basic disaster management. This study is a qualitative research with case study approach. The research shows that after five days of training, there as a significant increase in knowledge and understanding of basic disaster management experienced by the trainees with a 61,73% overall increase. The post-training data shows that 61% of the trainees have a very good understanding, 24% with good understanding, 13% with adequate understanding, and 2% with poor understanding. The result suggests that a short-time education with a structured curriculum can successfully increase the knowledge and understanding of disaster management on a basic level and can hypothetically contribute to the effort to reduce disaster risks.

Keywords: disaster education, basic disaster management training, three Pillars of Higher Education, disaster risk reduction

Procedia PDF Downloads 137
370 Cyberfraud Schemes: Modus Operandi, Tools and Techniques and the Role of European Legislation as a Defense Strategy

Authors: Papathanasiou Anastasios, Liontos George, Liagkou Vasiliki, Glavas Euripides

Abstract:

The purpose of this paper is to describe the growing problem of various cyber fraud schemes that exist on the internet and are currently among the most prevalent. The main focus of this paper is to provide a detailed description of the modus operandi, tools, and techniques utilized in four basic typologies of cyber frauds: Business Email Compromise (BEC) attacks, investment fraud, romance scams, and online sales fraud. The paper aims to shed light on the methods employed by cybercriminals in perpetrating these types of fraud, as well as the strategies they use to deceive and victimize individuals and businesses on the internet. Furthermore, this study outlines defense strategies intended to tackle the issue head-on, with a particular emphasis on the crucial role played by European Legislation. European legislation has proactively adapted to the evolving landscape of cyber fraud, striving to enhance cybersecurity awareness, bolster user education, and implement advanced technical controls to mitigate associated risks. The paper evaluates the advantages and innovations brought about by the European Legislation while also acknowledging potential flaws that cybercriminals might exploit. As a result, recommendations for refining the legislation are offered in this study in order to better address this pressing issue.

Keywords: business email compromise, cybercrime, European legislation, investment fraud, NIS, online sales fraud, romance scams

Procedia PDF Downloads 98
369 Numerical Investigation of Tsunami Flow Characteristics and Energy Reduction through Flexible Vegetation

Authors: Abhishek Mukherjee, Juan C. Cajas, Jenny Suckale, Guillaume Houzeaux, Oriol Lehmkuhl, Simone Marras

Abstract:

The investigation of tsunami flow characteristics and the quantification of tsunami energy reduction through the coastal vegetation is important to understand the protective benefits of nature-based mitigation parks. In the present study, a three-dimensional non-hydrostatic incompressible Computational Fluid Dynamics model with a two-way coupling enabled fluid-structure interaction approach (FSI) is used. After validating the numerical model against experimental data, tsunami flow characteristics have been investigated by varying vegetation density, modulus of elasticity, the gap between stems, and arrangement or distribution of vegetation patches. Streamwise depth average velocity profiles, turbulent kinetic energy, energy flux reflection, and dissipation extracted by the numerical study will be presented in this study. These diagnostics are essential to assess the importance of different parameters to design the proper coastal defense systems. When a tsunami wave reaches the shore, it transforms into undular bores, which induce scour around offshore structures and sediment transport. The bed shear stress, instantaneous turbulent kinetic energy, and the vorticity near-bed will be presented to estimate the importance of vegetation to prevent tsunami-induced scour and sediment transport.

Keywords: coastal defense, energy flux, fluid-structure interaction, natural hazards, sediment transport, tsunami mitigation

Procedia PDF Downloads 150
368 Wireworms under the Sword of Damocles: Attraction to Maize Root Volatiles

Authors: Diana La Forgia, Jean Baptiste Thibord, François Verheggen

Abstract:

Volatiles Organic Compound (VOCs) are one of the many features of defense used by plants in their eternal fight against pests. Their main role is to attract the natural enemies of the herbivores. But on another hand, they can be used by the same herbivores to locate plants while foraging. In an attempt to fill a gap of knowledge in a complex web of interactions, we focused on wireworms (Coleoptera:Elateridae). Wireworms whose larvae feed on roots are one of the most spread pests of valuable crops such as maize and potatoes, causing important economical damage. Little is known about the root compounds that are playing a role in the attraction of the larvae. In order to know more about these compounds, we compared four different maize varieties (Zea mays mays) that are known to have different levels of attraction, from weak to strong, for wireworms in fields. We tested the attraction of larvae in laboratory conditions in dual-choice olfactometer assays where they were offered all possible combinations of the four maize varieties. Contemporary, we collected the VOCs of each variety during 24h using a push-and-pull system. The collected samples were then analyzed by gas chromatography coupled with a mass spectrometer (GC-MS) to identify their molecular profiles. The choice of the larvae was dependent on the offered combination and some varieties were preferred to others. Differences were also observed in terms of quantitative and qualitative emissions of volatile profiles between the maize varieties. Our aim is to develop traps based on VOCs from maize roots to open a new frontier in wireworms management.

Keywords: integrated pest management, maize roots, plant defense, volatile organic compounds, wireworms

Procedia PDF Downloads 155
367 Simulation Analysis of a Full-Scale Five-Story Building with Vibration Control Dampers

Authors: Naohiro Nakamura

Abstract:

Analysis methods to accurately estimate the behavior of buildings when earthquakes occur is very important for improving the seismic safety of such buildings. Recently, the use of damping devices has increased significantly and there is a particular need to appropriately evaluate the behavior of buildings with such devices during earthquakes in the design stage. At present, however, the accuracy of the analysis evaluations is not sufficient. One reason is that the accuracy of current analysis methods has not been appropriately verified because there is very limited data on the behavior of actual buildings during earthquakes. Many types of shaking table test of large structures are performed at the '3-Dimensional Full-Scale Earthquake Testing Facility' (nicknamed 'E-Defense') operated by the National Research Institute of Earth Science and Disaster Prevention (NIED). In this study, simulations using 3- dimensional analysis models were conducted on shaking table test of a 5-story steel-frame structure with dampers. The results of the analysis correspond favorably to the test results announced afterward by the committee. However, the suitability of the parameters and models used in the analysis and the influence they had on the responses remain unclear. Hence, we conducted additional analysis and studies on these models and parameters. In this paper, outlines of the test are shown and the utilized analysis model is explained. Next, the analysis results are compared with the test results. Then, the additional analyses, concerning with the hysteresis curve of the dampers and the beam-end stiffness of the frame, are investigated.

Keywords: three-dimensional analysis, E-defense, full-scale experimen, vibration control damper

Procedia PDF Downloads 190
366 Research on Autonomous Controllability of BeiDou Navigation Satellite System Based on Knowledge Transformation

Authors: Hang Ju, Changmin Zhu

Abstract:

The development level of the BeiDou Navigation Satellite System (BDS) can strongly reflect national defense strength as an important spatial information infrastructure. BDS can be not only used for military purposes, such as intelligence gathering, nuclear explosion monitoring, emergency communications, but also for location services, transportation, mapping, precision agriculture. In order to ensure the national defense security and the wide application of BDS in civil and military areas, BDS must be autonomous and controllable. As a complex system of knowledge-intensive, knowledge transformation runs through the whole process of research and development, production, operation, and maintenance of BDS. Based on the perspective of knowledge transformation, this paper expounds on the meaning of socialization, externalization, combination, and internalization of knowledge transformation, and the coupling relationship of autonomy and control on the basis of analyzing the status quo and problems of the autonomy and control of BDS. The autonomous and controllable framework of BDS based on knowledge transformation is constructed from six dimensions of management capability, R&D capability, technical capability, manufacturing capability, service support capability, and application capability. It can provide support for the smooth implementation of information security policy, provide a reference for the autonomy and control of the upstream and downstream industrial chains in Beidou, and provide a reference for the autonomous and controllable research of aerospace components, military measurement test equipment, and other related industries.

Keywords: knowledge transformation, BeiDou Navigation Satellite System, autonomy and control, framework

Procedia PDF Downloads 184
365 Early Diagnosis and Treatment of Cancer Using Synthetic Cationic Peptide

Authors: D. J. Kalita

Abstract:

Cancer is one of the prime causes of early death worldwide. Mutation of the gene involve in DNA repair and damage, like BRCA2 (Breast cancer gene two) genes, can be detected efficiently by PCR-RFLP to early breast cancer diagnosis and adopt the suitable method of treatment. Host Defense Peptide can be used as blueprint for the design and synthesis of novel anticancer drugs to avoid the side effect of conventional chemotherapy and chemo resistance. The change at nucleotide position 392 of a -› c in the cancer sample of dog mammary tumour at BRCA2 (exon 7) gene lead the creation of a new restriction site for SsiI restriction enzyme. This SNP may be a marker for detection of canine mammary tumour. Support vector machine (SVM) algorithm was used to design and predict the anticancer peptide from the mature functional peptide. MTT assay of MCF-7 cell line after 48 hours of post treatment showed an increase in the number of rounded cells when compared with untreated control cells. The ability of the synthesized peptide to induce apoptosis in MCF-7 cells was further investigated by staining the cells with the fluorescent dye Hoechst stain solution, which allows the evaluation of the nuclear morphology. Numerous cells with dense, pyknotic nuclei (the brighter fluorescence) were observed in treated but not in control MCF-7 cells when viewed using an inverted phase-contrast microscope. Thus, PCR-RFLP is one of the attractive approach for early diagnosis, and synthetic cationic peptide can be used for the treatment of canine mammary tumour.

Keywords: cancer, cationic peptide, host defense peptides, Breast cancer genes

Procedia PDF Downloads 90
364 Interaction between Kazal-Type Serine Proteinase Inhibitor SPIPm2 and Cyclophilin A from the Black Tiger Shrimp Penaeus monodon

Authors: Sirikwan Ponprateep, Anchalee Tassanakajon, Vichien Rimphanitchayakit

Abstract:

A Kazal-type serine proteinase inhibitor, SPIPm2, was abundantly expressed in the hemocytes and secreted into shrimp plasma has anti-viral property against white spot syndrome virus (WSSV). To discover the molecular mechanism of antiviral activity, the binding assay showed that SPIPm2 bind to the components of viral particle and shrimp hemocyte. From our previous report, viral target protein of SPIPm2 was identified, namely WSV477 using yeast two-hybrid screening. WSV477 is an early gene product of WSSV and involved in viral propagation. In this study, the co-immunoprecipitation technique and Tandem Mass Spectrometry (LC-MS/MS) was used to identify the target protein of SPIPm2 from shrimp hemocyte. The target protein of SPIPm2 was cyclophilin A. In vertebrate, cyclophilin A or peptidylprolyl isomerase A was reported to be the immune suppressor interacted with cyclosporin A involved in immune defense response. The recombinant cyclophilin A from Penaeus monodon (rPmCypA) was produced in E.coli system and purified using Ni-NTA column to confirm the protein-protein interaction. In vitro pull-down assay showed the interaction between rSPIPm2 and rPmCypA. To study the biological function of these proteins, the expression analysis of immune gene in shrimp defense pathways will be investigated after rPmCypA administration.

Keywords: cyclophilin A, protein-protein interaction, Kazal-type serine proteinase inhibitor, Penaeus monodon

Procedia PDF Downloads 236
363 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 59
362 Cybersecurity Strategies for Protecting Oil and Gas Industrial Control Systems

Authors: Gaurav Kumar Sinha

Abstract:

The oil and gas industry is a critical component of the global economy, relying heavily on industrial control systems (ICS) to manage and monitor operations. However, these systems are increasingly becoming targets for cyber-attacks, posing significant risks to operational continuity, safety, and environmental integrity. This paper explores comprehensive cybersecurity strategies for protecting oil and gas industrial control systems. It delves into the unique vulnerabilities of ICS in this sector, including outdated legacy systems, integration with IT networks, and the increased connectivity brought by the Industrial Internet of Things (IIoT). We propose a multi-layered defense approach that includes the implementation of robust network security protocols, regular system updates and patch management, advanced threat detection and response mechanisms, and stringent access control measures. We illustrate the effectiveness of these strategies in mitigating cyber risks and ensuring the resilient and secure operation of oil and gas industrial control systems. The findings underscore the necessity for a proactive and adaptive cybersecurity framework to safeguard critical infrastructure in the face of evolving cyber threats.

Keywords: cybersecurity, industrial control systems, oil and gas, cyber-attacks, network security, IoT, threat detection, system updates, patch management, access control, cybersecurity awareness, critical infrastructure, resilience, cyber threats, legacy systems, IT integration, multi-layered defense, operational continuity, safety, environmental integrity

Procedia PDF Downloads 43
361 Cluster-Based Exploration of System Readiness Levels: Mathematical Properties of Interfaces

Authors: Justin Fu, Thomas Mazzuchi, Shahram Sarkani

Abstract:

A key factor in technological immaturity in defense weapons acquisition is lack of understanding critical integrations at the subsystem and component level. To address this shortfall, recent research in integration readiness level (IRL) combines with technology readiness level (TRL) to form a system readiness level (SRL). SRL can be enriched with more robust quantitative methods to provide the program manager a useful tool prior to committing to major weapons acquisition programs. This research harnesses previous mathematical models based on graph theory, Petri nets, and tropical algebra and proposes a modification of the desirable SRL mathematical properties such that a tightly integrated (multitude of interfaces) subsystem can display a lower SRL than an inherently less coupled subsystem. The synthesis of these methods informs an improved decision tool for the program manager to commit to expensive technology development. This research ties the separately developed manufacturing readiness level (MRL) into the network representation of the system and addresses shortfalls in previous frameworks, including the lack of integration weighting and the over-importance of a single extremely immature component. Tropical algebra (based on the minimum of a set of TRLs or IRLs) allows one low IRL or TRL value to diminish the SRL of the entire system, which may not be reflective of actuality if that component is not critical or tightly coupled. Integration connections can be weighted according to importance and readiness levels are modified to be a cardinal scale (based on an analytic hierarchy process). Integration arcs’ importance are dependent on the connected nodes and the additional integrations arcs connected to those nodes. Lack of integration is not represented by zero, but by a perfect integration maturity value. Naturally, the importance (or weight) of such an arc would be zero. To further explore the impact of grouping subsystems, a multi-objective genetic algorithm is then used to find various clusters or communities that can be optimized for the most representative subsystem SRL. This novel calculation is then benchmarked through simulation and using past defense acquisition program data, focusing on the newly introduced Middle Tier of Acquisition (rapidly field prototypes). The model remains a relatively simple, accessible tool, but at higher fidelity and validated with past data for the program manager to decide major defense acquisition program milestones.

Keywords: readiness, maturity, system, integration

Procedia PDF Downloads 92
360 The Amorphousness of the Exposure Sphere

Authors: Nipun Ansal

Abstract:

People guard their beliefs and opinions with their lives. Beliefs that they’ve formed over a period of time, and can go to any lengths to defy, desist from, resist and negate any outward stimulus that has the potential to shake them. Cognitive dissonance is term used to describe it in theory. And every human being, in order to defend himself from cognitive dissonance applies 4 rings of defense viz. Selective Exposure, Selective Perception, Selective Attention, and Selective Retention. This paper is a discursive analysis on how the onslaught of social media, complete with its intrusive weaponry, has amorphized the external ring of defense: the selective exposure. The stimulus-response model of communication is one of the most inherent model that encompasses communication behaviours of children and elderly, individual and masses, humans and animals alike. The paper deliberates on how information bombardment through the uncontrollable channels of the social media, Facebook and Twitter in particular, have dismantled our outer sphere of exposure, leading users online to a state of constant dissonance, and thus feeding impulsive action-taking. It applies case study method citing an example to corroborate how knowledge generation has given in to the information overload and the effect it has on decision making. With stimulus increasing in number of encounters, opinion formation precedes knowledge because of the increased demand of participation and decrease in time for the information to permeate from the outer sphere of exposure to the sphere of retention, which of course, is through perception and attention. This paper discusses the challenge posed by this fleeting, stimulus rich, peer-dominated media on the traditional models of communication and meaning-generation.

Keywords: communication, discretion, exposure, social media, stimulus

Procedia PDF Downloads 408
359 Demonstration of Logical Inconsistency in the Discussion of the Problem of Evil

Authors: Mohammad Soltani Renani

Abstract:

The problem of evil is one of the heated battlegrounds of the idea of theism and its critics. Since time immemorial and in various philosophical schools and religions, the belief in an Omniscient, Omnipotent, and Absolutely Good God has been considered inconsistent with the existence of the evil in the universe. The theist thinkers have generally adopted one of the following four ways for answering this problem: denial of the existence of evil or considering it to be relative, privation theory of evil, attribution of evil to something other than God, and depiction of an alternative picture of God. Defense or criticism of these alternative answers have given rise to an extensive and unending dispute. However, evaluation of the presupposition and context upon/in which a question is raised precedes offering an answer to it. This point in the discussion of the problem of evil is of paramount importance for both parties, i.e., questioners and answerers, that the attributes of knowledge, power, love, good-will, among others, can be supposed to be infinite only in the essence of the attributed and the domain of potentiality but what can be realized in the domain of actuality is always finite. Therefore, infinite nature of Divine Attributes and realization of evil belong to two spheres. Divine Attributes are infinite (absolute) in Divine Essence, but when they are created, each one becomes bounded by the other. This boundedness is a result of the state of being surrounded of the attributes by each other in finite world of possibility. Evil also appears in this limited world. This inconsistency leads to the collapse of the problem of evil from within: the place of infinity of the Divine Attributes, in the words of Muslim mystics, lies in the Holiest Manifestation [Feyze Aqdas] while evil emerges in the Holy Manifestation where the Divine Attributes become bounded by each other. This idea is neither a new answer to the problem of evil nor a defense of theism; rather it reveals a logical inconsistency in the discussion of the problem of evil.

Keywords: problem of evil, infinity of divine attributes, boundedness of divine attributes, holiest manifestation, holy manifestation

Procedia PDF Downloads 146
358 Histopathological and Biochemical Investigations of Protective Role of Honey in Rats with Experimental Aflatoxicosis

Authors: Turan Yaman, Zabit Yener, Ismail Celik

Abstract:

The aim of this study was to investigate the antioxidant properties and protective role of honey, considered a part of traditional medicine, against carcinogen chemical aflatoxin (AF) exposure in rats, which were evaluated by histopathological changes in liver and kidney, measuring level of serum marker enzymes [aspartate aminotransferase (AST), alanin aminotransferase (ALT), gamma glutamil transpeptidase (GGT)], antioxidant defense systems [Reduced glutathione (GSH), glutathione reductase (GR), superoxide dismutase (SOD), glutathione-S-transferase (GST) and catalase (CAT)], and lipid peroxidation content in liver, erythrocyte, brain, kidney, heart and lungs. For this purpose, a total of eighteen healthy Sprague-Dawley rats were randomly allocated into three experimental groups: A (Control), B (AF-treated) and C (AF+honey-treated). While rats in group A were fed with a diet without AF, B, and C groups received 25 µg of AF/rat/day, where C group additionally received 1 mL/kg of honey by gavage for 90 days. At the end of the 90-day experimental period, we found that the honey supplementation decreased the lipid peroxidation and the levels of enzyme associated with liver damage, increased enzymatic and non-enzymatic antioxidants in the AF+honey-treated rats. Hepatoprotective and nephroprotective effects of honey is further substantiated by showing almost normal histological architecture in AF+honey-treated group, compared to degenerative changes in the liver and kidney of AF-treated rats. Additionally, honey supplementation ameliorated antioxidant defense systems and lipid peroxidation content in other tissues of AF+honey-treated rats. In conclusion, the present study indicates that honey has a hepatoprotective and nephroprotective effect in rats with experimental aflatoxicosis due to its antioxidant activity.

Keywords: aflatoxicosis, honey, histopathology, malondialdehyde, antioxidant, rat

Procedia PDF Downloads 334