Search results for: Advanced Persistent Threat (APT)
3639 Probabilistic Study of Impact Threat to Civil Aircraft and Realistic Impact Energy
Authors: Ye Zhang, Chuanjun Liu
Abstract:
In-service aircraft is exposed to different types of threaten, e.g. bird strike, ground vehicle impact, and run-way debris, or even lightning strike, etc. To satisfy the aircraft damage tolerance design requirements, the designer has to understand the threatening level for different types of the aircraft structures, either metallic or composite. Exposing to low-velocity impacts may produce very serious internal damages such as delaminations and matrix cracks without leaving visible mark onto the impacted surfaces for composite structures. This internal damage can cause significant reduction in the load carrying capacity of structures. The semi-probabilistic method provides a practical and proper approximation to establish the impact-threat based energy cut-off level for the damage tolerance evaluation of the aircraft components. Thus, the probabilistic distribution of impact threat and the realistic impact energy level cut-offs are the essential establishments required for the certification of aircraft composite structures. A new survey of impact threat to civil aircraft in-service has recently been carried out based on field records concerning around 500 civil aircrafts (mainly single aisles) and more than 4.8 million flight hours. In total 1,006 damages caused by low-velocity impact events had been screened out from more than 8,000 records including impact dents, scratches, corrosions, delaminations, cracks etc. The impact threat dependency on the location of the aircraft structures and structural configuration was analyzed. Although the survey was mainly focusing on the metallic structures, the resulting low-energy impact data are believed likely representative to general civil aircraft, since the service environments and the maintenance operations are independent of the materials of the structures. The probability of impact damage occurrence (Po) and impact energy exceedance (Pe) are the two key parameters for describing the statistic distribution of impact threat. With the impact damage events from the survey, Po can be estimated as 2.1x10-4 per flight hour. Concerning the calculation of Pe, a numerical model was developed using the commercial FEA software ABAQUS to backward estimate the impact energy based on the visible damage characteristics. The relationship between the visible dent depth and impact energy was established and validated by drop-weight impact experiments. Based on survey results, Pe was calculated and assumed having a log-linear relationship versus the impact energy. As the product of two aforementioned probabilities, Po and Pe, it is reasonable and conservative to assume Pa=PoxPe=10-5, which indicates that the low-velocity impact events are similarly likely as the Limit Load events. Combing Pa with two probabilities Po and Pe obtained based on the field survey, the cutoff level of realistic impact energy was estimated and valued as 34 J. In summary, a new survey was recently done on field records of civil aircraft to investigate the probabilistic distribution of impact threat. Based on the data, two probabilities, Po and Pe, were obtained. Considering a conservative assumption of Pa, the cutoff energy level for the realistic impact energy has been determined, which provides potential applicability in damage tolerance certification of future civil aircraft.Keywords: composite structure, damage tolerance, impact threat, probabilistic
Procedia PDF Downloads 3083638 Member States 'Perception of Threat' to Migration Crises as a Determinant Factor of Change in Cooperation: A Comparison between the Yugoslav Migration Crisis and the Syrian Refugees' Crisis
Authors: Diego Caballero Vélez
Abstract:
In 1997 the Schengen Convention was incorporated in the mainstream of EU law by the Amsterdam Treaty. It came into effect in 1999 with the abolition of internal border controls in the EU, a milestone in the European integration project. In the meantime, due to the Yugoslav wars, nearly 700,000 asylum applications were filed in the European countries provoking a major refugee crisis. During this period, the opening of Eastern Europe fostered more cooperation and policy-making at the EU level in migration issues. Currently, a similar migratory crisis is taking place in Europe. The Syrian war has caused the most massive influx of immigrants in Europe since World War II. Nevertheless, the EU is adopting different migration policies from those implemented during the Yugoslav migration crisis. The current crisis has not led to a common European position but national responses have been offered on migration policies and responsibility for border security and asylum-seekers. A lot of factors can explain this change from a cooperation scenario to a no cooperation one, such as the economic crisis, but this research is focused on the premise that 'threat perception' lies at the core of some states grand strategies towards migration and it also influences in multilateral or unilateral responses. Migration rests at the nexus of three dimensions of security, including geopolitical interests, material production, and internal security. According to some scholars, migration policy is an 'integral instrument' of state grand strategy in that context. Political integration at the EU might be altered with the emergence of existential threats. In other words, some areas of the European cooperation can be transformed when a 'critical juncture' occurs, for instance a migration crisis. In that instance, Member states could see migration as a matter of threat that modifies their national interests and willingness to embrace international cooperation. This research will focus on EU Member states´ perceptions of the 90´s migration crisis and the current one. The goal is to evaluate to what extent the perceptions of threat are one of the main factors for explaining the transition from a cooperation scenario to a no-cooperation one in European asylum and security policies. To analyze threat perception in both migration crisis, some relevant Member states are treated as cases of study and a comparative analysis is carried out based on public opinion polls, public and policy discourse in migration, voting practices and deconstruction of the migration policies themselves both at EU level and a national one.Keywords: cooperation, migration crisis, national responses, threat perception
Procedia PDF Downloads 2393637 Changing Governance and the Role of People's Involvement in Municipal Solid Waste Management: Study of Two Municipal Corporations in Kerala
Authors: Prathibha Ganesan
Abstract:
This paper discusses discontents of inhabitants in the landfills and its culmination into resistance against centralised waste disposal during the last three decades in Kerala. The study is based on a sample survey of 175 households located in the landfill sites and city limits of two Municipal Corporations viz. Thrissur and Cochin. The study found that waste is dumped in the periphery of the urban area where economically and socially vulnerable people are densely populated. Moreover, landfill sites are unscientifically managed to cause severe socio-economic and health issues to the local people, finally leading to their mobilisation and persistent struggle. The struggles often culminate in the closure of landfills or forced relocation or abandonment of the region by the community. The study concluded that persistent people’s struggles compel the local state to either find alternatives to centralised solid waste management system or use political power to subsume the local resistance. The persistence of the struggles determined the type waste governance adopted by the local governments.Keywords: solid waste management, municipal corporation, resistance movements, urban, Kerala
Procedia PDF Downloads 2663636 Review of Suitable Advanced Oxidation Processes for Degradation of Organic Compounds in Produced Water during Enhanced Oil Recovery
Authors: Smita Krishnan, Krittika Chandran, Chandra Mohan Sinnathambi
Abstract:
Produced water and its treatment and management are growing challenges in all producing regions. This water is generally considered as a nonrevenue product, but it can have significant value in enhanced oil recovery techniques if it meets the required quality standards. There is also an interest in the beneficial uses of produced water for agricultural and industrial applications. Advanced Oxidation Process is a chemical technology that has been growing recently in the wastewater treatment industry, and it is highly recommended for non-easily removal of organic compounds. The efficiency of AOPs is compound specific, therefore, the optimization of each process should be done based on different aspects.Keywords: advanced oxidation process, photochemical processes, degradation, organic contaminants
Procedia PDF Downloads 5033635 A Machine Learning-based Study on the Estimation of the Threat Posed by Orbital Debris
Authors: Suhani Srivastava
Abstract:
This research delves into the classification of orbital debris through machine learning (ML): it will categorize the intensity of the threat orbital debris poses through multiple ML models to gain an insight into effectively estimating the danger specific orbital debris can pose to future space missions. As the space industry expands, orbital debris becomes a growing concern in Low Earth Orbit (LEO) because it can potentially obfuscate space missions due to the increased orbital debris pollution. Moreover, detecting orbital debris and identifying its characteristics has become a major concern in Space Situational Awareness (SSA), and prior methods of solely utilizing physics can become inconvenient in the face of the growing issue. Thus, this research focuses on approaching orbital debris concerns through machine learning, an efficient and more convenient alternative, in detecting the potential threat certain orbital debris pose. Our findings found that the Logistic regression machine worked the best with a 98% accuracy and this research has provided insight into the accuracies of specific machine learning models when classifying orbital debris. Our work would help provide space shuttle manufacturers with guidelines about mitigating risks, and it would help in providing Aerospace Engineers facilities to identify the kinds of protection that should be incorporated into objects traveling in the LEO through the predictions our models provide.Keywords: aerospace, orbital debris, machine learning, space, space situational awareness, nasa
Procedia PDF Downloads 203634 Deployment of Beyond 4G Wireless Communication Networks with Carrier Aggregation
Authors: Bahram Khan, Anderson Rocha Ramos, Rui R. Paulo, Fernando J. Velez
Abstract:
With the growing demand for a new blend of applications, the users dependency on the internet is increasing day by day. Mobile internet users are giving more attention to their own experiences, especially in terms of communication reliability, high data rates and service stability on move. This increase in the demand is causing saturation of existing radio frequency bands. To address these challenges, researchers are investigating the best approaches, Carrier Aggregation (CA) is one of the newest innovations, which seems to fulfill the demands of the future spectrum, also CA is one the most important feature for Long Term Evolution - Advanced (LTE-Advanced). For this purpose to get the upcoming International Mobile Telecommunication Advanced (IMT-Advanced) mobile requirements (1 Gb/s peak data rate), the CA scheme is presented by 3GPP, which would sustain a high data rate using widespread frequency bandwidth up to 100 MHz. Technical issues such as aggregation structure, its implementations, deployment scenarios, control signal techniques, and challenges for CA technique in LTE-Advanced, with consideration of backward compatibility, are highlighted in this paper. Also, performance evaluation in macro-cellular scenarios through a simulation approach is presented, which shows the benefits of applying CA, low-complexity multi-band schedulers in service quality, system capacity enhancement and concluded that enhanced multi-band scheduler is less complex than the general multi-band scheduler, which performs better for a cell radius longer than 1800 m (and a PLR threshold of 2%).Keywords: component carrier, carrier aggregation, LTE-advanced, scheduling
Procedia PDF Downloads 1993633 A Study on How Insider Fraud Impacts FinTechs
Authors: Claire Norman-Maillet
Abstract:
Insider fraud is a major financial crime threat whereby an employee defrauds (or attempts to defraud) their current, prospective, or past employer. ‘Employee’ covers anyone employed by the company, including Board members and part-time staff. Insider fraud can take many forms, including an employee working alone or in collusion with others. Insider fraud has been on the rise since the Coronavirus pandemic and shows no signs of slowing. The objective of the research is to better understand how FinTechs are impacted by insider fraud and, therefore, how to stop it. This research will make an original contribution to the financial crime field, given the timing of this research being intertwined with the cost-of-living crisis in the UK and the global Coronavirus pandemic. This research focuses on insider fraud within FinTechs specifically, as they are arguably a modern phenomenon in the financial institutions space and have cutting-edge technology at their disposal. To achieve the research objective, the researcher held semi-structured interviews with over 20 individuals who deal with insider fraud perpetration in a practitioner, recruitment, or advisory capacity. The interviews were subsequently transcribed and analysed thematically. Main findings in the research suggest that FinTechs are arguably in the best position to combat insider fraud, given their focus on using recent technologies, as this can be used to combat the threat. However, insider fraud has been ignored owing to the denial of accepting the possibility that colleagues would defraud their employer, as well as the idea that external fraud is the most important threat. The research concludes that, whilst the technology is understandably prioritised by FinTechs for providing an agreeable customer experience, insider fraud needs to be given a platform upon which to be recognised as a significant threat to any company. Moreover, insider fraud needs to be given the same level of weighting and attention by Executive Committees and Boards as the customer experience.Keywords: insider fraud, occupational fraud, COVID-19, COVID, Coronavirus, pandemic, internal fraud, financial crime, economic crime
Procedia PDF Downloads 593632 National Security Threat and Fear of Rising Islamic Extremism in Bangladesh due to Influx of Rohingya Refugees
Authors: Afsana Afsar Tuly
Abstract:
The Rohingyas are a group of minority Muslimsin Myanmar who witnessed series of persecution, violence, and torture from Burmese military since 1948. In 2017, around 700,000 Rohingyas fled to the neighboring country Bangladesh and took shelter as refugees after facing clashes with Myanmar security forces. The number increased to 1.8 million in 2020, creating one of the largest refugee crises of recent times. This research focuses on the vulnerability and poverty faced by Rohingyas in refugee camps and how thelack of long-term solution and silence from international communitycan pose national security threat and increasing Islamic extremism in Bangladesh. Islamic religious and terrorist groups have used the Rohingyas position as stateless people to influence them into speaking against the secular government of Bangladesh. There has been increasing crime rates and formation of different rebel groups in refugee camps, causing clashes with Bangladeshi police and authority. Human trafficking, illegal drug dealings, prostitution, and other illicit activities have continuously gone up in the southeastern part of Bangladesh. Some economic, social, and environmental factors are studied and analyzed to show the change in Bangladesh between 2017 and 2020.Keywords: national security threat, islamic extremism, rohingya refugees, refugee studies, Bangladesh, myanmar
Procedia PDF Downloads 1443631 Fusion Models for Cyber Threat Defense: Integrating Clustering, Random Forests, and Support Vector Machines to Against Windows Malware
Authors: Azita Ramezani, Atousa Ramezani
Abstract:
In the ever-escalating landscape of windows malware the necessity for pioneering defense strategies turns into undeniable this study introduces an avant-garde approach fusing the capabilities of clustering random forests and support vector machines SVM to combat the intricate web of cyber threats our fusion model triumphs with a staggering accuracy of 98.67 and an equally formidable f1 score of 98.68 a testament to its effectiveness in the realm of windows malware defense by deciphering the intricate patterns within malicious code our model not only raises the bar for detection precision but also redefines the paradigm of cybersecurity preparedness this breakthrough underscores the potential embedded in the fusion of diverse analytical methodologies and signals a paradigm shift in fortifying against the relentless evolution of windows malicious threats as we traverse through the dynamic cybersecurity terrain this research serves as a beacon illuminating the path toward a resilient future where innovative fusion models stand at the forefront of cyber threat defense.Keywords: fusion models, cyber threat defense, windows malware, clustering, random forests, support vector machines (SVM), accuracy, f1-score, cybersecurity, malicious code detection
Procedia PDF Downloads 713630 Urban Vegetation as a Mitigation Strategy for Urban Heat Island Effect a Case of Kerala
Authors: Athul T.
Abstract:
Kerala cities in India are grappling with an alarming rise in temperatures fueled by the Urban Heat Island (UHI) effect. This phenomenon, exacerbated by rapid urbanization and climate change, poses a significant threat to public health and environmental well-being. In response to this growing concern, this study investigates the potential of urban vegetation as a powerful mitigation strategy against UHI. The study delves into the intricate relationship between micro-climate changes, UHI intensity, and the strategic placement of greenery in alleviating these effects. Utilizing advanced simulation software, the most effective vegetation types and configurations for maximizing UHI reduction will be identified. By analyzing the current state of Kozhikode's urban vegetation and its influence on microclimates, this study aims to tailor actionable strategies for Kerala cities, potentially paving the way for a more sustainable and thermally comfortable urban future.Keywords: urban heat island, climate change, micro climate, urban vegetation
Procedia PDF Downloads 633629 COVID-19: A Thread to the Security System of Foreign Investment
Authors: Mehdi Ghaemi
Abstract:
In principle, foreign investment security is enshrined in International Investment Agreements (IIAs) and Bilateral Investment Treaties (BITs) in the form of protection standards such as the Full Protection and Security Standard (FPS). Accordingly, the host countries undertake to provide the necessary security for the economic activities of foreign investment. With the outbreak of coronavirus, the international community called COVID-19 a threat to international peace security, as well as to the public interest and national security of nations; and to deal with, they proposed several solutions, generally including quarantine, creating social distances, and restricting businesses. This article first studies the security of foreign investment in international investment law. In the following, it analyzes the consequences of the COVID-19 pandemic for foreign investment security so that if there is a threat to that security, solutions could be offered to reduce it.Keywords: foreign investment, FPS standard, host country, public health, COVID-19
Procedia PDF Downloads 1053628 Survivability of Maneuvering Aircraft against Air to Air Infrared Missile
Authors: Ji-Yeul Bae, Hyung Mo Bae, Jihyuk Kim, Hyung Hee Cho
Abstract:
An air to air infrared missile poses a significant threat to the survivability of an aircraft due to an advanced sensitivity of sensor and maneuverability of the missile. Therefore, recent military aircraft is equipped with MAW (Missile Approach Warning) to take an evasive maneuver and to deploy countermeasures like chaff and flare. In this research, an effect of MAW sensitivity and resulting evasive maneuver on the survivability of the fighter aircraft is studied. A single engine fighter jet with Mach 0.9 flying at an altitude of 5 km is modeled in the research and infrared signature of the aircraft is calculated by numerical simulation. The survivability is assessed in terms of lethal range. The MAW sensitivity and maneuverability of an aircraft is used as variables. The result showed that improvement in survivability mainly achieved when the missile approach from the side of the aircraft. And maximum 30% increase in survivability of the aircraft is achieved when existence of the missile is noticed at 7 km distance. As a conclusion, sensitivity of the MAW seems to be more important factor than the maneuverability of the aircraft in terms of the survivability.Keywords: air to air missile, missile approach warning, lethal range, survivability
Procedia PDF Downloads 5673627 On Dynamic Chaotic S-BOX Based Advanced Encryption Standard Algorithm for Image Encryption
Authors: Ajish Sreedharan
Abstract:
Security in transmission and storage of digital images has its importance in today’s image communications and confidential video conferencing. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well known block cipher that has several advantages in data encryption. However, it is not suitable for real-time applications. This paper presents modifications to the Advanced Encryption Standard to reflect a high level security and better image encryption. The modifications are done by adjusting the ShiftRow Transformation and using On Dynamic chaotic S-BOX. In AES the Substitute bytes, Shift row and Mix columns by themselves would provide no security because they do not use the key. In Dynamic chaotic S-BOX Based AES the Substitute bytes provide security because the S-Box is constructed from the key. Experimental results verify and prove that the proposed modification to image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that with a comparison to original AES encryption algorithm the modified algorithm gives better encryption results in terms of security against statistical attacks.Keywords: advanced encryption standard (AES), on dynamic chaotic S-BOX, image encryption, security analysis, ShiftRow transformation
Procedia PDF Downloads 4373626 Refinement of Existing Benzthiazole lead Targeting Lysine Aminotransferase in Dormant Stage of Mycobacterium tuberculosis
Authors: R. Reshma srilakshmi, S. Shalini, P. Yogeeswari, D. Sriram
Abstract:
Lysine aminotransferase is a crucial enzyme for dormancy in M. tuberculosis. It is involved in persistence and antibiotic resistance. In present work, we attempted to develop benzthiazole derivatives as lysine aminotransferase inhibitors. In our attempts, we also unexpectedly arrived at an interesting compound 21 (E)-4-(5-(2-(benzo[d]thiazol-2-yl)-2-cyanovinyl)thiophen-2-yl)benzoic acid which even though has moderate activity against persistent phase of mycobacterium, it has significant potency against active phase. In the entire series compound 22 (E)-4-(5-(2-(benzo[d]thiazol-2-yl)-2-cyanovinyl)thiophen-2-yl)isophthalic acid emerged as potent molecule with LAT IC50 of 2.62 µM. It has a significant log reduction of 2.9 and 2.3 fold against nutrient starved and biofilm forming mycobacteria. It was found to be inactive in MABA assay and M.marinum induced zebra fish model. It is also devoid of cytotoxicity. Compound 22 was also found to possess bactericidal effect which is independent of concentration and time. It was found to be effective in combination with Rifampicin in 3D granuloma model. The results are very encouraging as the hit molecule shows activity against active as well as persistent forms of tuberculosis. The identified hit needs further more pharmacokinetic and dynamic screening for development as new drug candidate.Keywords: benzothiazole, latent tuberculosis, LAT, nutrient starvation
Procedia PDF Downloads 3303625 Investigating the Use of Advanced Manufacturing Technologies in the Assembly Type Manufacturing Companies in Trinidad and Tobago
Authors: Nadine Sangster, Akil James, Rondell Duke, Aaron Ameerali, Terrence Lalla
Abstract:
The market place of the 21st century is evolving into one of merging national markets, fragmented consumer markets, and rapidly changing product technologies. The use of new technologies has become vital to the manufacturing industry for their survival and sustainability. This work focused on the assembly type industry in a small developing country and aimed at identifying the use of advanced manufacturing technologies and their impact on this sector of the manufacturing industry. It was found that some technologies were being used and that they had improved the effectiveness of those companies but there was still quite a bit of room for improvements. Some of the recommendations included benchmarking against international standards, the adoption of a “made in TT” campaign and the effective utilisation of the technologies to improve manufacturing effectiveness and thus improve competitive advantages and strategies.Keywords: advanced manufacturing technology, Trinidad and Tobago, manufacturing, industrial engineering
Procedia PDF Downloads 4933624 Advanced Manufacturing Technology Adoption and Organizational Structure
Authors: George Nyori Makari
Abstract:
Data on 92 industrial organizations point to the existence of relationships between advanced manufacturing technology (AMT) adoption and some aspects of organizational structure, including the number of specialized sub-units, the number of levels of authority, span of control, degree of role programming specification, degree of communication programming specification and the degree of output programming. Primary finding is that as the investments and integration of AMTs increases, the more likely the foregoing aspects of structure increase. The findings hold with size and a number of other organizational variables controlled. The results indicate that a company’s capacity to assimilate technology depends on its organizational capabilities. The study encapsulates the need for companies to increase their organizational capabilities during investment and integration of AMTs.Keywords: advanced manufacturing technology, adoption, organizational structure, Kenya
Procedia PDF Downloads 4563623 Securitization of Illegal Fishing Cases in Natuna Waters by Indonesian Government: Study Case of Chinese Vessels Shootouts 2016
Authors: Ray Maximillian, Idil Syawfi
Abstract:
Indonesia’s Exclusive Economic Zone and the infamous China’s nine-dash line are intersected in Natuna waters. Even though from Indonesia perspective, that line does not possess any legal basis, China treat that line as their national boundaries, therefore allowing Chinese fishermen to fish in the area. Under President Joko Widodo leadership, Indonesia which now focusing to suppress illegal fishing cases while emphasizing their maritime sovereignty is facing an imminent threat from China’s presence in Natuna. Tension between these countries spiked after three incident happened on 2016, especially after Indonesian navy shot Chinese fishermen vessel that suspected doing illegal fishing activity. This action seen as an attempt to secure Indonesia’s law enforcement in their waters after several months before such attempt was intervened by Chinese coast guard. Indonesia tries to securitize this issue to justify the shooting they done to Chinese vessels. In the process of securitization, it is imperative to identify the existential threat that leads to implementation of emergency measures which responded by units in the cases. Chinese coast guard presence in Natuna perceived as an existential threat to Indonesia, therefore, responded by shooting to Chinese vessels on the next encounter. This action then responded by Chinese government who said that there is overlapping claim between them and Indonesia in Natuna.Keywords: China, illegal fishing, Indonesia, natuna, securitization
Procedia PDF Downloads 2153622 Role of Ologen in Previously Failed Trabeculectomy in Advanced Glaucoma
Authors: Reetika Sharma, Lalit Tejwani, Himanshu Shekhar, Arun Singhvi
Abstract:
Purpose: Advanced Glaucoma with Failed trab is not an uncommon sight in glaucoma clinic, and such cases usually tend to present with high intraocular pressure (IOP) and advanced cupping, or even glaucomatous atrophy stage. Re-surgery is needed for such cases, and wound modulation poses a major challenge in these cases. We share our experience in this case series with the use of Ologen (collagen matrix implant) along with MMC 0.04% used in surgery. The purpose of the study was to evaluate the efficacy and outcome of collagen matrix implant in re-trabeculectomy in advanced glaucoma cases. Methodology: Eleven eyes of 11 patients (one eye of one patient) underwent re-trabeculectomy surgery with MMC and Ologen. Ologen implant was used in sub scleral and subconjunctival space, as a spacer and wound modulator. In five cases, triple modulation with implant soaked in anti-VEGF was used. Results: All patients had cupping more than 0.9, and one case was GOA. All cases were on maximal medication at presentation and majority were on systemic anti-glaucoma therapy also. Post-surgery, follow-up ranged from 13 – 34 months, and all cases had a follow longer than the gap between previous surgery (which was failed) and re-trab. One case needed AC reformation and one needling was done. Phaco was done at same sitting in four cases. All cases had their IOP lowered post surgery, and vision was maintained in all, however one case was considered as failed re-surgery case. Topical medication was needed in seven cases post-surgery also. Conclusion: Ologen as adjuvant should be considered in all re-trab cases and all high risk and advanced cases, and triple modulation can be next step in these cases. Aggressive IOP control and non- reluctance to continue topical medications post second surgery should be considered in such cases, to give them best possible vision.Keywords: failed trabeculectomy, ologen, trabeculectomy, advanced glaucoma
Procedia PDF Downloads 3343621 Protecting Privacy and Data Security in Online Business
Authors: Bilquis Ferdousi
Abstract:
With the exponential growth of the online business, the threat to consumers’ privacy and data security has become a serious challenge. This literature review-based study focuses on a better understanding of those threats and what legislative measures have been taken to address those challenges. Research shows that people are increasingly involved in online business using different digital devices and platforms, although this practice varies based on age groups. The threat to consumers’ privacy and data security is a serious hindrance in developing trust among consumers in online businesses. There are some legislative measures taken at the federal and state level to protect consumers’ privacy and data security. The study was based on an extensive review of current literature on protecting consumers’ privacy and data security and legislative measures that have been taken.Keywords: privacy, data security, legislation, online business
Procedia PDF Downloads 1063620 A Qualitative Case Study Exploring Zambian Mathematics Teachers' Content Knowledge of Functions
Authors: Priestly Malambo, Sonja Van Putten, Hanlie Botha, Gerrit Stols
Abstract:
The relevance of what is content is taught in tertiary teacher training has long been in question. This study attempts to understand how advanced mathematics courses equip student teachers to teach functions at secondary school level. This paper reports on an investigation that was conducted in an African university, where preservice teachers were purposefully selected for participation in individual semi-structured interviews after completing a test on functions as taught at secondary school. They were asked to justify their reasoning in the test and to explain functions in a way that might bring about understanding of the topic in someone who did not know how functions work. These were final year preservice mathematics teachers who had studied advanced mathematics courses for three years. More than 50% of the students were not able to explain concepts or to justify their reasoning about secondary school functions in a coherent way. The results of this study suggest that the study of advanced mathematics does not automatically enable students to teach secondary school functions, and that, although these students were able to do advanced mathematics, they were unable to explain the working of functions in a way that would allow them to teach this topic successfully.Keywords: secondary school, mathematical reasoning, student-teachers, functions
Procedia PDF Downloads 2543619 Impact of Terrorism as an Asymmetrical Threat on the State's Conventional Security Forces
Authors: Igor Pejic
Abstract:
The main focus of this research will be on analyzing correlative links between terrorism as an asymmetrical threat and the consequences it leaves on conventional security forces. The methodology behind the research will include qualitative research methods focusing on comparative analysis of books, scientific papers, documents and other sources, in order to deduce, explore and formulate the results of the research. With the coming of the 21st century and the rising multi-polar, new world threats quickly emerged. The realistic approach in international relations deems that relations among nations are in a constant state of anarchy since there are no definitive rules and the distribution of power varies widely. International relations are further characterized by egoistic and self-orientated human nature, anarchy or absence of a higher government, security and lack of morality. The asymmetry of power is also reflected on countries' security capabilities and its abilities to project power. With the coming of the new millennia and the rising multi-polar world order, the asymmetry of power can be also added as an important trait of the global society which consequently brought new threats. Among various others, terrorism is probably the most well-known, well-based and well-spread asymmetric threat. In today's global political arena, terrorism is used by state and non-state actors to fulfill their political agendas. Terrorism is used as an all-inclusive tool for regime change, subversion or a revolution. Although the nature of terrorist groups is somewhat inconsistent, terrorism as a security and social phenomenon has a one constant which is reflected in its political dimension. The state's security apparatus, which was embodied in the form of conventional armed forces, is now becoming fragile, unable to tackle new threats and to a certain extent outdated. Conventional security forces were designed to defend or engage an exterior threat which is more or less symmetric and visible. On the other hand, terrorism as an asymmetrical threat is a part of hybrid, special or asymmetric warfare in which specialized units, institutions or facilities represent the primary pillars of security. In today's global society, terrorism is probably the most acute problem which can paralyze entire countries and their political systems. This problem, however, cannot be engaged on an open field of battle, but rather it requires a different approach in which conventional armed forces cannot be used traditionally and their role must be adjusted. The research will try to shed light on the phenomena of modern day terrorism and to prove its correlation with the state conventional armed forces. States are obliged to adjust their security apparatus to the new realism of global society and terrorism as an asymmetrical threat which is a side-product of the unbalanced world.Keywords: asymmetrical warfare, conventional forces, security, terrorism
Procedia PDF Downloads 2623618 Advanced Nurse Practitioners in Clinical Practice - a Leadership Challenge
Authors: Mette Kjerholt, Thora Grothe Thomsen, Connie Bøttcher Berthelsen, Bibi Hølge Hazelton
Abstract:
Academic nursing is a relatively new phenomenon in Denmark. Leadership and management training in nursing does not prepare Danish nurse leaders to become leaders for nurses with academic background, and some leaders may feel estranged with including this kind of nursing staff in clinical settings. Currently there is a debate regarding what academic nurses can contribute with in clinical practice, and some managers express concern regarding whether this will lead to less focus on clinical practice and more focus on theoretical issues that may not seem so relevant in a busy everyday clinical setting. The paper will present the experiences of integrating three advanced nurse practitioners with Ph.D. degrees (ANP) in three different clinical departments at a regional hospital in Denmark with no prior experiences with such profiles among its staff.Keywords: leadership, advanced nurse practitioners, clinical practice, academic nursing
Procedia PDF Downloads 5763617 Design and Performance Analysis of Advanced B-Spline Algorithm for Image Resolution Enhancement
Authors: M. Z. Kurian, M. V. Chidananda Murthy, H. S. Guruprasad
Abstract:
An approach to super-resolve the low-resolution (LR) image is presented in this paper which is very useful in multimedia communication, medical image enhancement and satellite image enhancement to have a clear view of the information in the image. The proposed Advanced B-Spline method generates a high-resolution (HR) image from single LR image and tries to retain the higher frequency components such as edges in the image. This method uses B-Spline technique and Crispening. This work is evaluated qualitatively and quantitatively using Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR). The method is also suitable for real-time applications. Different combinations of decimation and super-resolution algorithms in the presence of different noise and noise factors are tested.Keywords: advanced b-spline, image super-resolution, mean square error (MSE), peak signal to noise ratio (PSNR), resolution down converter
Procedia PDF Downloads 3993616 The Limits to Self-Defense Claims in Case of Domestic Violence Homicides
Authors: Maria Elisabete Costa Ferreira
Abstract:
Domestic violence is a serious social issue in which victims are mostly women. Domestic violence develops in cycles, starting with the building of tension, passing through the incident of abuse and ending with reconciliation, also known as honeymoon. As time goes by, the shorter these phases become, and the greater and more severe the attacks, rarely leading to the death of the victim of abuse. Sometimes, the victim stops the abuse by killing the aggressor, usually after the immediate aggression has taken place. This poses an important obstacle to the claim of self-defense by the victim of domestic violence pending trial for the homicide of her long-time abuser. The main problem with self-defense claims in such cases is that the law requires the act of aggression to be present or imminent (imminent threat or immediate danger) so that it permits the victim to take her defense into her own hands. If the episode of aggression has already taken place, this general requirement for the admissibility of self-defense is not satisfied. This paper sheds new light on the concept of the actuality of the aggression, understanding that, since domestic violence is a permanent offense, for as long as the victim stays under the domain of the aggressor, imminent threat will be present, allowing the self-defense claim of a woman who kills her abuser in such circumstances to be admissible. An actualist interpretation of the requirement of the necessity of the means used in self-defense will be satisfied when evaluated from the subjective perspective of the intimate partner victim. Necessity will be satisfied if it is reasonable for the victim to perceive the use of lethal force as the only means to release herself from the abuser.Keywords: domestic violence, homicide, self-defense, imminent threat, necessity of lethal force
Procedia PDF Downloads 653615 Study of Petroleum Hydrocarbons Biodegradation and the Role of Biosurfactants Produced by Bacteria Isolated from the Lagoon of Mar Chica in This Process
Authors: Ikram Kamal, Mohamed Blaghen
Abstract:
Petroleum hydrocarbons are serious problems and global pollutants in the environment due to their toxicity, carcinogenicity and persistent organic pollutant properties. One of the approaches to enhance biodegradation of petroleum hydrocarbons is to use biosurfactant. Biosurfactants are amphiphilic biomolecules produced as metabolic by-products from microorganisms they received considerable attention in the field of environmental remediation processes such as bioremediation. Biosurfactants have been considered as a desirable alternative to synthetic surfactants in various applications particularly in the environmental field. In comparison with their synthetic counterparts, biosurfactants have been reported to be less toxic, biodegradable and persistent. In this study we have investigated the potential of bacterial strains collected aseptically from the lagoon Marchika (water and soil) in Nador, Morocco; for the production of biosurfactants. This study also aimed to optimize the biosurfactant production process by changing the variables that influence the type and amount of biosurfactant produced by these microorganisms such as: carbon sources and also other physical and chemical parameters such as temperature and pH. Emulsification index, methylene blue test and thin layer chromatography (TLC) revealed the ability of strains used in this study to produce compounds that could emulsify gasoline. In addition, a HPLC/MS was used to separate and identify different biosurfactants purified.Keywords: petroleum hydrocarbons, biosurfactants, biodegradation, lagoon marchika, emulsification index
Procedia PDF Downloads 2623614 Management Opposition, Strikes, and Union Threats
Authors: Patrick Nüß
Abstract:
I estimate management opposition against unions in terms of hiring discrimination by a large scale field experiment in the German labor market. The results show that callback rates for union members decrease significantly in the presence of high sectoral union density and large firm size. I further explore how this effect varies with regional and sectoral labor dispute intensity and find that management opposition is stronger when a sector is exposed to an intense labor dispute. There is evidence that the observed management opposition can be explained by sectoral union threat effects. Sectors with lower hiring discrimination have lower coverage of collective agreements, and in the absence of a collective agreement, they are less likely to follow the collective agreement wage setting.Keywords: trade unions, Industrial relations, management opposition, union threat, labor disputes, field experiments
Procedia PDF Downloads 1853613 Financial and Human Resources of Terrorism
Authors: Abdurrahman Karacabey
Abstract:
Threat paradigm has shifted throughout the history. Considering conjuncture of our time, a major threat for humanity is terrorism. Although variety of reasons are influential, financial, and human resources are the vital needs for terrorist groups. It is known that terrorism is a significant term while taking decisions in diplomatic, politic, and military issues. Even though the methods to provide resources for terrorism are quite similar, there are still some differences for deterrent terrorist groups being active in various regions of the globe. Due to social and psychological reasons activists have generally similar excuses to join terrorist groups.At the same time, terrorists’ fiscal activities to secure permanence of terrorism, occupy the politics of the countries. Besides, preventive actions are expensive creating huge burdens in host nation’s economy. This paper elaborates on how ISIS is providing human and economic resources, course of actions to overcome ISIS is on the agenda of all countries.Keywords: financial resources, human resources, isis, terrorism
Procedia PDF Downloads 4123612 Treatment of Sanitary Landfill Leachate by Advanced Oxidation Techniques
Authors: R. Kerbachi , Y. Medkour, F. Sahnoune
Abstract:
The integrated waste management is an important aspect in the implementation of sustainable development. Leachate generated by sanitary landfills is a high-strength wastewater that is likely to contain large amounts of organic and inorganic matter, with humic substances, as well as ammonia nitrogen, heavy metals, chlorinated organic and inorganic salts. Untreated leachates create a great potential for harm to the environment, they can permeate ground water or mix with surface water and contribute to the pollution of soil, ground water, and surface water. In Algeria, the treatment of landfill leachate is the weakest link in the solid waste management. This study focuses on the evaluation of the pollution load carried by leachate produced in a former sanitary landfill located to the west of Algiers and the implementation of advanced oxidation treatment (advanced oxidation process, AOP), Fenton, electro-Fenton etc. The characterization of these leachates shows that they have a high organic load, mineral and nitrogen. Measured COD reaches very high values of the order of 5000 to 20,000 mg O2 / L. On this non-biodegradable leachate, treatment tests have been carried out by the methods of coagulation-flocculation, Fenton oxidation, electrocoagulation and electro-Fenton. The removal efficiencies of pollution obtained for each of these modes of treatment are respectively 69, 80, 84 and 97%. The study shows that advanced oxidation processes are very suitable for the treatment of poorly biodegradable leachate.Keywords: advanced oxidation processes, electrocoagulation, electro-Fenton, leachates treatment, sanitary landfill
Procedia PDF Downloads 2983611 A Robust Software for Advanced Analysis of Space Steel Frames
Authors: Viet-Hung Truong, Seung-Eock Kim
Abstract:
This paper presents a robust software package for practical advanced analysis of space steel framed structures. The pre- and post-processors of the presented software package are coded in the C++ programming language while the solver is written by using the FORTRAN programming language. A user-friendly graphical interface of the presented software is developed to facilitate the modeling process and result interpretation of the problem. The solver employs the stability functions for capturing the second-order effects to minimize modeling and computational time. Both the plastic-hinge and fiber-hinge beam-column elements are available in the presented software. The generalized displacement control method is adopted to solve the nonlinear equilibrium equations.Keywords: advanced analysis, beam-column, fiber-hinge, plastic hinge, steel frame
Procedia PDF Downloads 3073610 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism
Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun
Abstract:
The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorismKeywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution
Procedia PDF Downloads 96