Search results for: pilot contamination attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2302

Search results for: pilot contamination attacks

1372 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises

Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh

Abstract:

As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.

Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan

Procedia PDF Downloads 28
1371 FTIR Characterization of EPS Ligands from Mercury Resistant Bacterial Isolate, Paenibacillus jamilae PKR1

Authors: Debajit Kalita, Macmillan Nongkhlaw, S. R. Joshi

Abstract:

Mercury (Hg) is a highly toxic heavy metal released both from naturally occurring volcanoes and anthropogenic activities like alkali and mining industries as well as biomedical wastes. Exposure to mercury is known to affect the nervous, gastrointestinal and renal systems. In the present study, a bacterial isolate identified using 16S rRNA marker as Paenibacillus jamilae PKR1 isolated from India’s largest sandstone-type uranium deposits, containing an average of 0.1% U3O8, was found to be resistance to Hg contamination under culture conditions. It showed strong hydrophobicity as revealed by SAT, MATH, PAT, SAA adherence assays. The Fourier Transform Infrared (FTIR) spectra showed the presence of hydroxyl, amino and carboxylic functional groups on the cell surface EPS which are known to contribute in the binding of metals. It is proposed that the characterized isolate tolerating up to 4.0mM of mercury provides scope for its application in bioremediation of mercury from contaminated sites.

Keywords: mercury, Domiasiat, uranium, paenibacillus jamilae, hydrophobicity, FTIR

Procedia PDF Downloads 397
1370 Monsoon Controlled Mercury Transportation in Ganga Alluvial Plain, Northern India and Its Implication on Global Mercury Cycle

Authors: Anjali Singh, Ashwani Raju, Vandana Devi, Mohmad Mohsin Atique, Satyendra Singh, Munendra Singh

Abstract:

India is the biggest consumer of mercury and, consequently, a major emitter too. The increasing mercury contamination in India’s water resources has gained widespread attention and, therefore, atmospheric deposition is of critical concern. However, little emphasis was placed on the role of precipitation in the aquatic mercury cycle of the Ganga Alluvial Plain which provides drinking water to nearly 7% of the world’s human population. A majority of the precipitation here occurs primarily in 10% duration of the year in the monsoon season. To evaluate the sources and transportation of mercury, water sample analysis has been conducted from two selected sites near Lucknow, which have a strong hydraulic gradient towards the river. 31 groundwater samples from Jehta village (26°55’15’’N; 80°50’21’’E; 119 m above mean sea level) and 31 river water samples from the Behta Nadi (a tributary of the Gomati River draining into the Ganga River) were collected during the monsoon season on every alternate day between 01 July to 30 August 2019. The total mercury analysis was performed by using Flow Injection Atomic Absorption Spectroscopy (AAS)-Mercury Hybride System, and daily rainfall data was collected from the India Meteorological Department, Amausi, Lucknow. The ambient groundwater and river-water concentrations were both 2-4 ng/L as there is no known geogenic source of mercury found in the area. Before the onset of the monsoon season, the groundwater and the river-water recorded mercury concentrations two orders of magnitude higher than the ambient concentrations, indicating the regional transportation of the mercury from the non-point source into the aquatic environment. Maximum mercury concentrations in groundwater and river-water were three orders of magnitude higher than the ambient concentrations after the onset of the monsoon season characterizing the considerable mobilization and redistribution of mercury by monsoonal precipitation. About 50% of both of the water samples were reported mercury below the detection limit, which can be mostly linked to the low intensity of precipitation in August and also with the dilution factor by precipitation. The highest concentration ( > 1200 ng/L) of mercury in groundwater was reported after 6-days lag from the first precipitation peak. Two high concentration peaks (>1000 ng/L) in river-water were separately correlated with the surface flow and groundwater outflow of mercury. We attribute the elevated mercury concentration in both of the water samples before the precipitation event to mercury originating from the extensive use of agrochemicals in mango farming in the plain. However, the elevated mercury concentration during the onset of monsoon appears to increase in area wetted with atmospherically deposited mercury, which migrated down from surface water to groundwater as downslope migration is a fundamental mechanism seen in rivers of the alluvial plain. The present study underscores the significance of monsoonal precipitation in the transportation of mercury to drinking water resources of the Ganga Alluvial Plain. This study also suggests that future research must be pursued for a better understand of the human health impact of mercury contamination and for quantification of the role of Ganga Alluvial Plain in the Global Mercury Cycle.

Keywords: drinking water resources, Ganga alluvial plain, india, mercury

Procedia PDF Downloads 137
1369 Domestic and Foreign Terrorism: Evaluation of the Breeding Ground

Authors: T. K. Hung

Abstract:

Terrorism acts have occurred across both developed and developing states, with well-identified motivation and causes. For many years, terrorism eradication has become a major topic yet only passive actions were taken in response to acts. The linkage between the location of terrorism occurrence and breeding ground is not well-documented, resulting in the passive approach used in counter-terrorism nowadays. The evaluation investigates all post-9/11 terrorism affairs considering their state capacity, safety, ease of border access control, religion diversity, and technology access, to measure the level of breeding ground of the states. Those "weak" states with poor border access control, resources capacity and domestic safety are the best breeding ground for terrorists. Although many attacks were caused by religious motivation, religion diversity does not predict the breeding ground. States with censored technology access, particular computer-mediated communication, predict on the terrorism breeding ground, moderated by the level of breeding ground of neighboring states.

Keywords: counter-terrorism, lethality, security, terrorism

Procedia PDF Downloads 327
1368 A Robust Digital Image Watermarking Against Geometrical Attack Based on Hybrid Scheme

Authors: M. Samadzadeh Mahabadi, J. Shanbehzadeh

Abstract:

This paper presents a hybrid digital image-watermarking scheme, which is robust against varieties of attacks and geometric distortions. The image content is represented by important feature points obtained by an image-texture-based adaptive Harris corner detector. These feature points are extracted from LL2 of 2-D discrete wavelet transform which are obtained by using the Harris-Laplacian detector. We calculate the Fourier transform of circular regions around these points. The amplitude of this transform is rotation invariant. The experimental results demonstrate the robustness of the proposed method against the geometric distortions and various common image processing operations such as JPEG compression, colour reduction, Gaussian filtering, median filtering, and rotation.

Keywords: digital watermarking, geometric distortions, geometrical attack, Harris Laplace, important feature points, rotation, scale invariant feature

Procedia PDF Downloads 491
1367 Mindfulness and Motivational Based Intervention for Pregnant Women with Tobacco Dependency: Pilot Study

Authors: Ilona Krone

Abstract:

Maternal smoking during pregnancy increases the risk of perinatal/postnatal negative health outcomes; however, only 1 in 5 pregnant smokers quit smoking. That is a clinical and public health problem. Pregnant smokers have negative paternal support, and higher levels of perceived stress than non-smokers and quitters return to smoking in a stressful situation. A crisis like the COVID-19 outbreak causes significant uncertainty and stress. For pregnant women, additional stress may increase due to concerns for their fetus. Strategies targeting maternal stress and isolation may be particularly useful to prevent negative outcomes for women and their fetuses. Within the post-doctoral study, cooperating with leading specialists, an innovative program for pregnant smokers will be developed. Feasibility for reducing craving, distress intolerance, Covid 19 related stress, and fear in pregnant women in Latvia will be assessed.

Keywords: COVID 19, mindfulness, motivation, pregnancy, smoking cessation

Procedia PDF Downloads 205
1366 Relation between Tourism and Health: Case Study AIDS in Lebanon

Authors: Viana Hassan

Abstract:

Each year, 600 million tourists travelled abroad to practice several types of tourism. Nowadays, whatever is the type of tourism practiced it considered as a real public health problem which can contribute the spread of several diseases such as AIDS, H1N1, NDM1 With regard to HIV/AIDS, Lebanon is always considered as a low HIV prevalence country. However, the potential risks associated with the mobility of the population, migration and tourism. The total number of cases reported by the ministry of health since 1989 until the end of 2011 is of 1455 cases, with an average of 85 new cases per year over the last three years. The main reason of the increased number is Travel and migration which represent 50% of the risks reported by cumulative cases. Given the interest of this kind of epidemic it would be interesting to study the Evolution of HIV/ AIDS and its relation with travel and tourism The main aim of this research is to study in general the relation between tourism and health, more specific to understand the relation between Tourism and AIDS, the problem of the transmission of HIV in Lebanon, the ways of contamination and the countries in which these people are contaminated.

Keywords: AIDS, tourism, health, Lebanon

Procedia PDF Downloads 324
1365 Providing a Secure Hybrid Method for Graphical Password Authentication to Prevent Shoulder Surfing, Smudge and Brute Force Attack

Authors: Faraji Sepideh

Abstract:

Nowadays, purchase rate of the smart device is increasing and user authentication is one of the important issues in information security. Alphanumeric strong passwords are difficult to memorize and also owners write them down on papers or save them in a computer file. In addition, text password has its own flaws and is vulnerable to attacks. Graphical password can be used as an alternative to alphanumeric password that users choose images as a password. This type of password is easier to use and memorize and also more secure from pervious password types. In this paper we have designed a more secure graphical password system to prevent shoulder surfing, smudge and brute force attack. This scheme is a combination of two types of graphical passwords recognition based and Cued recall based. Evaluation the usability and security of our proposed scheme have been explained in conclusion part.

Keywords: brute force attack, graphical password, shoulder surfing attack, smudge attack

Procedia PDF Downloads 147
1364 Managing Human-Wildlife Conflicts Compensation Claims Data Collection and Payments Using a Scheme Administrator

Authors: Eric Mwenda, Shadrack Ngene

Abstract:

Human-wildlife conflicts (HWCs) are the main threat to conservation in Africa. This is because wildlife needs overlap with those of humans. In Kenya, about 70% of wildlife occurs outside protected areas. As a result, wildlife and human range overlap, causing HWCs. The HWCs in Kenya occur in the drylands adjacent to protected areas. The top five counties with the highest incidences of HWC are Taita Taveta, Narok, Lamu, Kajiado, and Laikipia. The common wildlife species responsible for HWCs are elephants, buffaloes, hyenas, hippos, leopards, baboons, monkeys, snakes, and crocodiles. To ensure individuals affected by the conflicts are compensated, Kenya has developed a model of HWC compensation claims data collection and payment. We collected data on HWC from all eight Kenya Wildlife Service (KWS) Conservation Areas from 2009 to 2019. Additional data was collected from stakeholders' consultative workshops held in the Conservation Areas and a literature review regarding payment of injuries and ongoing insurance schemes being practiced in areas. This was followed by the description of the claims administration process and calculation of the pricing of the compensation claims. We further developed a digital platform for data capture and processing of all reported conflict cases and payments. Our product recognized four categories of HWC (i.e., human death and injury, property damage, crop destruction, and livestock predation). Personal bodily injury and human death were provided based on the Continental Scale of Benefits. We proposed a maximum of Kenya Shillings (KES) 3,000,000 for death. Medical, pharmaceutical, and hospital expenses were capped at a maximum of KES 150,000, as well as funeral costs at KES 50,000. Pain and suffering were proposed to be paid for 12 months at the rate of KES 13,500 per month. Crop damage was to be based on farm input costs at a maximum of KES 150,000 per claim. Livestock predation leading to death was based on Tropical Livestock Unit (TLU), which is equivalent to KES 30,000, whick includes Cattle (1 TLU = KES 30,000), Camel (1.4 TLU = KES 42,000), Goat (0.15 TLU = 4,500), Sheep (0.15 TLU = 4,500), and Donkey (0.5 TLU = KES 15,000). Property destruction (buildings, outside structures and harvested crops) was capped at KES 150,000 per any one claim. We conclude that it is possible to use an administrator to collect data on HWC compensation claims and make payments using technology. The success of the new approach will depend on a piloting program. We recommended that a pilot scheme be initiated for eight months in Taita Taveta, Kajiado, Baringo, Laikipia, Narok, and Meru Counties. This will test the claims administration process as well as harmonize data collection methods. The results of this pilot will be crucial in adjusting the scheme before country-wide roll out.

Keywords: human-wildlife conflicts, compensation, human death and injury, crop destruction, predation, property destruction

Procedia PDF Downloads 45
1363 The Antimicrobrial Effect of Alkaloids (Harmin, Harmalin) Extracted from Peganum harmala (L) Seeds in the South of Algeria (Bousaada)

Authors: Nassima Behidj-Benyounes, Thoraya Dahmene, Nadjiba Chebout

Abstract:

This work examines the study of the antimicrobrial effect of alkaloids extracted from the seeds of Peganum harmala L (Zygophyllaceae). This natural substance is extracted by using different solvents (aqueous, ethanolic, and hexane). The evaluation of the antimicrobial activity has only dealt with alkaloids. The antimicrobial effect of alkaloids is evaluated on several microorganisms. It has been tested on eight bacterial strains. The extract has been studied by using two yeasts. Finally, three molds have been studied. It should be noted that these agents are characterized by a high frequency of contamination and pathogenicity. Through this study, we note that Staphylococcus aureus, Saccharomyces cerievisae and E. coli are very sensitive in respect of the ethanol extract. Pseudomonas aerogenosa and Penicillium sp. are resistant to this extract. The other microorganisms are moderately sensitive. The study of the antimicrobial activity of different extracts of the Harmel has shown an optimal activity with the ethanol extract.

Keywords: Peganum harmala L., seeds, alkaloids, bacteria, fungi, yeast, antimicrobial activity

Procedia PDF Downloads 385
1362 Indigenizing the Curriculum: Teaching at the Ifugao State University, Philippines

Authors: Nancy Ann P. Gonzales, Serafin L. Ngohayon

Abstract:

The Nurturing Indigenous Knowledge Experts (NIKE) among the young generation in Ifugao was a project in Ifugao, Philippines spearheaded by the Ifugao State University (IFSU) and was sponsored by the UNESCO Association in Japan. Through the project, he Ifugao Indigenous Knowledge Workbook was developed. It contains nine chapters. The workbook was pilot-tested to students who had IK classes. The descriptive survey method of research was used. A questionnaire was used to gather data from first year Bachelor of Elementary Education and Bachelor of Political Science students. Frequency count, percentage and mean were computed. T-test was used to determine if there exists significant difference on knowledge gained before and after IK was taught to the students. Results revealed that the respondents have an increased level of IK in all the areas covered in the NIKE workbook after they enrolled in their classes. It is alarming to note that the students are knowledgeable about IK but they are not practicing it. However, according to the respondents, they will apply their IK through teaching after graduation.

Keywords: curriculum, elders, Indigenous knowledge, and students

Procedia PDF Downloads 345
1361 Awakeness, Awareness and Learning Mathematics for Arab Students: A Pilot Study

Authors: S. Rawashdi, D. Bshouty

Abstract:

This paper aimed at discussing how to urge middle and high school Arab students in Israel to be aware of the importance of and investing in learning mathematics. In the first phase of the study, three questionnaires were passed to two nine-grade classes, one on Awareness, one on Awakeness and one on Learning. One of the two classes was an outstanding class from a public school (PUBS) of 31 students, and the other a heterogeneous class from a private school (PRIS) with 31 students. The Learning questionnaire which was administrated to the Awareness and Awareness topics was passed to PRIS and the Awareness and Awareness Questionnaires were passed to the PUBS class After two months we passed the post-questionnaire to both classes to validate the long-term impact of the study. The findings of the study show that awakeness and awareness processes have an effect on the math learning process, on its context in students' daily lives and their growing interest in learning math.

Keywords: awakeness, awareness, learning mathematics, pupils

Procedia PDF Downloads 128
1360 Survey of Campylobacter Contamination in Poultry Meat and By-Products in Khuzestan Province

Authors: Ali Bagherpour, Masoud Soltanialvar

Abstract:

Campylobacter species are common bacterial pathogens associated with human gastroenteritis which are generally transmitted through foods of animal origin. This study was carried out to determine the prevalence of Campylobacter species in poultry meat and by products in the city of Dezful in Iran. Since April 2012 to July 2013, a total of 400 samples including meat (n = 100), liver (n = 100), gizzard (n = 100), and poultry heart (n = 100), were randomly collected from Dezful industrial poultry abattoir and were experimented in order to investigate presence of Campylobacter species. According to culture test, 251 samples out of 400 samples under study (69%) were contaminated with Campylobacter species. The highest prevalence of Campylobacter species was observed in poultry's liver (78.3%) and then in gizzard (75.8%), heart (65%) and meat (56.7%). The most common isolated Campylobacter were C. jejuni (90.9%) and the rest were C. coli (9.1%). There was a significant difference (P < 0.05) in the prevalence of Campylobacter species between the meat samples taken in the summer (86.7%). The results of this study indicate the importance of edible offal of poultries as the potential source of Campylobacter infections.

Keywords: Campylobacter jejuni, Campylobacter coli, poultry, meat, products

Procedia PDF Downloads 597
1359 Mobile Agent Security Using Reference Monitor Based Security Framework

Authors: Sandhya Armoogum

Abstract:

In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code.

Keywords: security, mobile agents, reference monitor, trust

Procedia PDF Downloads 428
1358 Incineration of Sludge in a Fluidized-Bed Combustor

Authors: Chien-Song Chyang, Yu-Chi Wang

Abstract:

For sludge disposal, incineration is considered to be better than direct burial because of regulations and space limitations in Taiwan. Additionally, burial after incineration can effectively prolong the lifespan of a landfill. Therefore, it is the most satisfactory method for treating sludge at present. Of the various incineration technologies, the fluidized bed incinerator is a suitable choice due to its fuel flexibility. In this work, sludge generated from industrial plants was treated in a pilot-scale vortexing fluidized bed. The moisture content of the sludge was 48.53%, and its LHV was 454.6 kcal/kg. Primary gas and secondary gas were fixed at 3 Nm3/min and 1 Nm3/min, respectively. Diesel burners with on-off controllers were used to control the temperature; the bed temperature was set to 750±20 °C, and the freeboard temperature was 850±20 °C. The experimental data show that the NO emission increased with bed temperature. The maximum NO emission is 139 ppm, which is in agreement with the regulation. The CO emission is low than 100 ppm through the operation period. The mean particle size of fly ash collected from baghouse decreased with operating time. The ration of bottom ash to fly ash is about 3. Compared with bottom ash, the potassium in the fly ash is much higher. It implied that the potassium content is not the key factor for aggregation of bottom ash.

Keywords: bottom ash, fluidized-bed combustion, incineration, sludge

Procedia PDF Downloads 263
1357 ERP Implementation in Iran: A Successful Experience in DGC

Authors: Mohammad Reza Ostad Ali Naghi Kashani

Abstract:

Nowadays, the amounts of companies which tend to have an Enterprise Resource Planning (ERP) application are increasing. Although ERP projects are expensive, time consuming, and complex, there are some successful experiences. These days, developing countries are striving to implement ERP projects successfully; however, there are many obstacles. Therefore, these projects would be failed or partially failed. This paper concerns the implementation of a successful ERP implementation, IFS, in Iran at Dana Geophysics Company (DGC). After a short review of ERP and ERP market in Iran, we propose a three phases deployment methodology (phase 1: Preparation and Business Process Management (BPM) phase 2: implementation and phase 3: testing, golive-1 (pilot) and golive-2 (final)). Then, we present five guidelines (Project Management, Change Management, Business Process Management (BPM), Training& Knowledge Management, and Technical Management), which were chose as work streams. In this case study we present lessons learned in Project management and Business process Management.

Keywords: business process management, critical success factors, ERP, project management

Procedia PDF Downloads 476
1356 A Socio-Technical Approach to Cyber-Risk Assessment

Authors: Kitty Kioskli, Nineta Polemi

Abstract:

Evaluating the levels of cyber-security risks within an enterprise is most important in protecting its information system, services and all its digital assets against security incidents (e.g. accidents, malicious acts, massive cyber-attacks). The existing risk assessment methodologies (e.g. eBIOS, OCTAVE, CRAMM, NIST-800) adopt a technical approach considering as attack factors only the capability, intention and target of the attacker, and not paying attention to the attacker’s psychological profile and personality traits. In this paper, a socio-technical approach is proposed in cyber risk assessment, in order to achieve more realistic risk estimates by considering the personality traits of the attackers. In particular, based upon principles from investigative psychology and behavioural science, a multi-dimensional, extended, quantifiable model for an attacker’s profile is developed, which becomes an additional factor in the cyber risk level calculation.

Keywords: attacker, behavioural models, cyber risk assessment, cybersecurity, human factors, investigative psychology, ISO27001, ISO27005

Procedia PDF Downloads 147
1355 Development of Infertility Prevention Psycho-Education Program for University Students and Evaluation of Its Effectiveness

Authors: Digdem M. Siyez, Bariscan Ozturk, Erol Esen, Ender Siyez, Yelda Kagnici, Bahar Baran

Abstract:

Infertility is a reproductive disease identified with the absence of pregnancy after regular unprotected sexual intercourse that has been lasting for 12 months or more. Some of the factors that cause infertility, which has been considered as a social and societal issue since the first days of the humankind, are preventable. These are veneral diseases, age, the frequency of the intercourse and its timing, drug use, bodyweight, environmental and professional conditions. Having actual information about the reproductive health is essential to take protective and preventive measures, and it is accepted as the most effective way to reduce the rate of infertility. However, during the literature review, it has been observed that there are so few studies that focus on the prevention of the infertility. The aim of this study is to develop a psycho-education program to reduce infertility among university students and also to evaluate the program’s effectiveness. It is believed that this program will increase the information level about infertility among the university students, help them to adopt healthy attitudes, develop life skills, create awareness about the risk factors and also contribute to the literature. Throughout the study, first, the contents of sexual/reproductive health programs developed for university students were examined by the researches. Besides, “Views about Reproductive Health Psycho-education Program Survey” was developed and applied to 10221 university students from 21 universities. In accordance with the literature and the university students’ views about reproductive health psycho-education program consisting of 9 sessions each of which lasts for 90 minutes was developed. The pilot program was carried out with 16 volunteer undergraduate students attending to a state university. During the evaluation of the pilot study, at the end of each session “Session Evaluation Form” and at the end of the entire program “Program Evaluation Form” were administered to the participants. Besides, one week after the end of the program, a focus group with half of the group, and individual interviews with the rest were conducted. Based on the evaluations, it was determined that the session duration is enough, the teaching methods meet the expectation, the techniques applied are appropriate and clear, and the materials are adequate. Also, an extra session was added to psycho-education program based on the feedbacks of the participants. In order to evaluate program’s effectiveness, Solomon control group design will be used. According to this design, the research has 2 experiment groups and 2 control groups. The participants who voluntarily participated in the research after the announcement of the psycho-education program were divided into experiment and control groups. In the experiment 1 and control 1 groups, “Personal Information Test”, “Infertility Information Test” and “Infertility Attitude Scale”, “Self Identification Inventory” and “Melbourne Decision Scale” were administered as a preliminary test. Currently, at the present stage, psycho-education still continues. After this 10-week program, the same tests will be administered again as the post-tests. The decision upon which statistical method will be applied in the analysis will be made afterwards according to whether the data meets the presuppositions or not.

Keywords: infertility, prevention, psycho-education, reproductive health

Procedia PDF Downloads 218
1354 Enabling Citizen Participation in Urban Planning through Geospatial Gamification

Authors: Joanne F. Hayek

Abstract:

This study explores the use of gamification to promote citizen e-participation in urban planning. The research departs from a case study: the ‘Shape Your City’ web app designed and programmed by the author and presented as part of the 2021 Dubai Design Week to engage citizens in the co-creation of the future of their city through a gamified experience. The paper documents the design and development methodology of the web app and concludes with the findings of its pilot release. The case study explores the use of mobile interactive mapping, real-time data visualization, augmented reality, and machine learning as tools to enable co-planning. The paper also details the user interface design strategies employed to integrate complex cross-sector e-planning systems and make them accessible to citizens.

Keywords: gamification, co-planning, citizen e-participation, mobile interactive mapping, real-time data visualization

Procedia PDF Downloads 132
1353 Green Marketing and Sustainable Development: Challenges and Opportunities

Authors: Guru P. S. Rangasamy

Abstract:

In the cutting edge period of globalization, it has turned into a test to keep the clients and also shoppers in overlay and even keep our regular habitat safe and that is the greatest need of the time. Purchasers are likewise mindful of the ecological issues like a dangerous atmospheric deviation and the effect of natural contamination. Green showcasing is a marvel which has created specific critical in the present day advertise and has risen as an imperative idea in India, as in different parts of the creating and created world and is viewed as an essential procedure of encouraging practical improvement. In this exploration paper, primary accentuation has been made of idea, need, and significance of green promoting. It investigates the principle issues in reception of green showcasing hones. The paper portrays the present situation of Indian market and investigates the difficulties and openings organizations have with green advertising, why organizations are receiving it and eventual fate of green promoting and presumes that green showcasing is something that will consistently develop in both practice and request.

Keywords: environmental pollution, green marketing, globalization, global warming, sustainable development

Procedia PDF Downloads 282
1352 An Industrial Scada System Remote Control Using Mobile Phones

Authors: Ahmidah Elgali

Abstract:

SCADA is the abbreviation for "Administrative Control And Data Acquisition." SCADA frameworks are generally utilized in industry for administrative control and information securing of modern cycles. Regular SCADA frameworks use PC, journal, slim client, and PDA as a client. In this paper, a Java-empowered cell phone has been utilized as a client in an example SCADA application to show and regulate the place of an example model crane. The paper presents a genuine execution of the online controlling of the model crane through a cell phone. The remote correspondence between the cell phone and the SCADA server is performed through a base station by means of general parcel radio assistance GPRS and remote application convention WAP. This application can be used in industrial sites in areas that are likely to be exposed to a security emergency (like terrorist attacks) which causes the sudden exit of the operators; however, no time to perform the shutdown procedures for the plant. Hence this application allows shutting down units and equipment remotely by mobile and so avoids damage and losses.

Keywords: control, industrial, mobile, network, remote, SCADA

Procedia PDF Downloads 63
1351 Numerical Investigation of Wave Run-Up on Curved Dikes

Authors: Suba Periyal Subramaniam, Babette Scheres, Altomare Corrado, Holger Schuttrumpf

Abstract:

Due to the climatic change and the usage of coastal areas, there is an increasing risk of dike failures along the coast worldwide. Wave run-up plays a key role in planning and design of a coastal structure. The coastal dike lines are bent either due to geological characteristics or due to influence of anthropogenic activities. The effect of the curvature of coastal dikes on wave run-up and overtopping is not yet investigated. The scope of this research is to find the effects of the dike curvature on wave run-up by employing numerical model studies for various dike opening angles. Numerical simulation is carried out using DualSPHysics, a meshless method, and OpenFOAM, a mesh-based method. The numerical results of the wave run-up on a curved dike and the wave transformation process for various opening angles, wave attacks, and wave parameters will be compared and discussed. This research aims to contribute a more precise analysis and understanding the influence of the curvature in the dike line and thus ensuring a higher level of protection in the future development of coastal structures.

Keywords: curved dikes, DualSPHysics, OpenFOAM, wave run-up

Procedia PDF Downloads 139
1350 A Novel Method For Non-Invasive Diagnosis Of Hepatitis C Virus Using Electromagnetic Signal Detection: A Multicenter International Study

Authors: Gamal Shiha, Waleed Samir, Zahid Azam, Premashis Kar, Saeed Hamid, Shiv Sarin

Abstract:

A simple, rapid and non-invasive electromagnetic sensor (C-FAST device) was- patented; for diagnosis of HCV RNA. Aim: To test the validity of the device compared to standard HCV PCR. Subjects and Methods: The first phase was done as pilot in Egypt on 79 participants; the second phase was done in five centers: one center from Egypt, two centers from Pakistan and two centers from India (800, 92 and 113 subjects respectively). The third phase was done nationally as multicenter study on (1600) participants for ensuring its representativeness. Results: When compared to PCR technique, C-FAST device revealed sensitivity 95% to 100%, specificity 95.5% to 100%, PPV 89.5% to 100%, NPV 95% to 100% and positive likelihood ratios 21.8% to 38.5%. Conclusion: It is practical evidence that HCV nucleotides emit electromagnetic signals that can be used for its identification. As compared to PCR, C-FAST is an accurate, valid and non-invasive device.

Keywords: C-FAST- a valid and reliable device, distant cellular interaction, electromagnetic signal detection, non-invasive diagnosis of HCV

Procedia PDF Downloads 421
1349 Intrusion Detection System Based on Peer to Peer

Authors: Alireza Pour Ebrahimi, Vahid Abasi

Abstract:

Recently by the extension of internet usage, Research on the intrusion detection system takes a significant importance. Many of improvement systems prevent internal and external network attacks by providing security through firewalls and antivirus. In recently years, intrusion detection systems gradually turn from host-based systems and depend on O.S to the distributed systems which are running on multiple O.S. In this work, by considering the diversity of computer networks whit respect to structure, architecture, resource, services, users and also security goals requirement a fully distributed collaborative intrusion detection system based on peer to peer architecture is suggested. in this platform each partner device (matched device) considered as a peer-to-peer network. All transmitted information to network are visible only for device that use security scanning of a source. Experimental results show that the distributed architecture is significantly upgradeable in respect to centralized approach.

Keywords: network, intrusion detection system, peer to peer, internal and external network

Procedia PDF Downloads 533
1348 Tracing Back the Bot Master

Authors: Sneha Leslie

Abstract:

The current situation in the cyber world is that crimes performed by Botnets are increasing and the masterminds (botmaster) are not detectable easily. The botmaster in the botnet compromises the legitimate host machines in the network and make them bots or zombies to initiate the cyber-attacks. This paper will focus on the live detection of the botmaster in the network by using the strong framework 'metasploit', when distributed denial of service (DDOS) attack is performed by the botnet. The affected victim machine will be continuously monitoring its incoming packets. Once the victim machine gets to know about the excessive count of packets from any IP, that particular IP is noted and details of the noted systems are gathered. Using the vulnerabilities present in the zombie machines (already compromised by botmaster), the victim machine will compromise them. By gaining access to the compromised systems, applications are run remotely. By analyzing the incoming packets of the zombies, the victim comes to know the address of the botmaster. This is an effective and a simple system where no specific features of communication protocol are considered.

Keywords: bonet, DDoS attack, network security, detection system, metasploit framework

Procedia PDF Downloads 246
1347 Variogram Fitting Based on the Wilcoxon Norm

Authors: Hazem Al-Mofleh, John Daniels, Joseph McKean

Abstract:

Within geostatistics research, effective estimation of the variogram points has been examined, particularly in developing robust alternatives. The parametric fit of these variogram points which eventually defines the kriging weights, however, has not received the same attention from a robust perspective. This paper proposes the use of the non-linear Wilcoxon norm over weighted non-linear least squares as a robust variogram fitting alternative. First, we introduce the concept of variogram estimation and fitting. Then, as an alternative to non-linear weighted least squares, we discuss the non-linear Wilcoxon estimator. Next, the robustness properties of the non-linear Wilcoxon are demonstrated using a contaminated spatial data set. Finally, under simulated conditions, increasing levels of contaminated spatial processes have their variograms points estimated and fit. In the fitting of these variogram points, both non-linear Weighted Least Squares and non-linear Wilcoxon fits are examined for efficiency. At all levels of contamination (including 0%), using a robust estimation and robust fitting procedure, the non-weighted Wilcoxon outperforms weighted Least Squares.

Keywords: non-linear wilcoxon, robust estimation, variogram estimation, wilcoxon norm

Procedia PDF Downloads 441
1346 Finite State Markov Chain Model of Pollutants from Service Stations

Authors: Amina Boukelkoul, Rahil Boukelkoul, Leila Maachia

Abstract:

The cumulative vapors emitted from the service stations may represent a hazard to the environment and the population. Besides fuel spill and their penetration into deep soil layers are the main contributors to soil and ground-water contamination in the vicinity of the petrol stations. The amount of the effluents from the service stations depends on strategy of maintenance and the policy adopted by the management to reduce the pollution. One key of the proposed approach is the idea of managing the effluents from the service stations which can be captured via use of a finite state Markov chain. Such a model can be embedded within a probabilistic operation and maintenance simulation reflecting the action to be done. In this paper, an approach of estimating a probabilistic percentage of the amount of emitted pollutants is presented. The finite state Markov model is used for decision problems with number of determined periods (life cycle) to predict the amount according to various options of operation.

Keywords: environment, markov modeling, pollution, service station

Procedia PDF Downloads 460
1345 Mean Shift-Based Preprocessing Methodology for Improved 3D Buildings Reconstruction

Authors: Nikolaos Vassilas, Theocharis Tsenoglou, Djamchid Ghazanfarpour

Abstract:

In this work we explore the capability of the mean shift algorithm as a powerful preprocessing tool for improving the quality of spatial data, acquired from airborne scanners, from densely built urban areas. On one hand, high resolution image data corrupted by noise caused by lossy compression techniques are appropriately smoothed while at the same time preserving the optical edges and, on the other, low resolution LiDAR data in the form of normalized Digital Surface Map (nDSM) is upsampled through the joint mean shift algorithm. Experiments on both the edge-preserving smoothing and upsampling capabilities using synthetic RGB-z data show that the mean shift algorithm is superior to bilateral filtering as well as to other classical smoothing and upsampling algorithms. Application of the proposed methodology for 3D reconstruction of buildings of a pilot region of Athens, Greece results in a significant visual improvement of the 3D building block model.

Keywords: 3D buildings reconstruction, data fusion, data upsampling, mean shift

Procedia PDF Downloads 307
1344 Artificial Intelligence in Management Simulators

Authors: Nuno Biga

Abstract:

Artificial Intelligence (AI) allows machines to interpret information and learn from context analysis, giving them the ability to make predictions adjusted to each specific situation. In addition to learning by performing deterministic and probabilistic calculations, the 'artificial brain' also learns through information and data provided by those who train it, namely its users. The "Assisted-BIGAMES" version of the Accident & Emergency (A&E) simulator introduces the concept of a "Virtual Assistant" (VA) that provides users with useful suggestions, namely to pursue the following operations: a) to relocate workstations in order to shorten travelled distances and minimize the stress of those involved; b) to identify in real time the bottleneck(s) in the operations system so that it is possible to quickly act upon them; c) to identify resources that should be polyvalent so that the system can be more efficient; d) to identify in which specific processes it may be advantageous to establish partnership with other teams; and e) to assess possible solutions based on the suggested KPIs allowing action monitoring to guide the (re)definition of future strategies. This paper is built on the BIGAMES© simulator and presents the conceptual AI model developed in a pilot project. Each Virtual Assisted BIGAME is a management simulator developed by the author that guides operational and strategic decision making, providing users with useful information in the form of management recommendations that make it possible to predict the actual outcome of different alternative management strategic actions. The pilot project developed incorporates results from 12 editions of the BIGAME A&E that took place between 2017 and 2022 at AESE Business School, based on the compilation of data that allows establishing causal relationships between decisions taken and results obtained. The systemic analysis and interpretation of this information is materialised in the Assisted-BIGAMES through a computer application called "BIGAMES Virtual Assistant" that players can use during the Game. Each participant in the Virtual Assisted-BIGAMES permanently asks himself about the decisions he should make during the game in order to win the competition. To this end, the role of the VA of each team consists in guiding the players to be more effective in their decision making through presenting recommendations based on AI methods. It is important to note that the VA's suggestions for action can be accepted or rejected by the managers of each team, and as the participants gain a better understanding of the game, they will more easily dispense with the VA's recommendations and rely more on their own experience, capability, and knowledge to support their own decisions. Preliminary results show that the introduction of the VA provides a faster learning of the decision-making process. The facilitator (Serious Game Controller) is responsible for supporting the players with further analysis and the recommended action may be (or not) aligned with the previous recommendations of the VA. All the information should be jointly analysed and assessed by each player, who are expected to add “Emotional Intelligence”, a component absent from the machine learning process.

Keywords: artificial intelligence (AI), gamification, key performance indicators (KPI), machine learning, management simulators, serious games, virtual assistant

Procedia PDF Downloads 92
1343 The Proactive Approach of Digital Forensics Methodology against Targeted Attack Malware

Authors: Mohamed Fadzlee Sulaiman, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin

Abstract:

Each individual organization has their own mechanism to build up cyber defense capability in protecting their information infrastructures from data breaches and cyber espionage. But, we can not deny the possibility of failing to detect and stop cyber attacks especially for those targeting credential information and intellectual property (IP). In this paper, we would like to share the modern approach of effective digital forensic methodology in order to identify the artifacts in tracing the trails of evidence while mitigating the infection from the target machine/s. This proposed approach will suit the digital forensic investigation to be conducted while resuming the business critical operation after mitigating the infection and minimizing the risk from the identified attack to transpire. Therefore, traditional digital forensics methodology has to be improvised to be proactive which not only focusing to discover the root caused and the threat actor but to develop the relevant mitigation plan in order to prevent from the same attack.

Keywords: digital forensic, detection, eradication, targeted attack, malware

Procedia PDF Downloads 263