Search results for: internal security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5123

Search results for: internal security

3923 Cyber-Med: Practical Detection Methodology of Cyber-Attacks Aimed at Medical Devices Eco-Systems

Authors: Nir Nissim, Erez Shalom, Tomer Lancewiki, Yuval Elovici, Yuval Shahar

Abstract:

Background: A Medical Device (MD) is an instrument, machine, implant, or similar device that includes a component intended for the purpose of the diagnosis, cure, treatment, or prevention of disease in humans or animals. Medical devices play increasingly important roles in health services eco-systems, including: (1) Patient Diagnostics and Monitoring; Medical Treatment and Surgery; and Patient Life Support Devices and Stabilizers. MDs are part of the medical device eco-system and are connected to the network, sending vital information to the internal medical information systems of medical centers that manage this data. Wireless components (e.g. Wi-Fi) are often embedded within medical devices, enabling doctors and technicians to control and configure them remotely. All these functionalities, roles, and uses of MDs make them attractive targets of cyber-attacks launched for many malicious goals; this trend is likely to significantly increase over the next several years, with increased awareness regarding MD vulnerabilities, the enhancement of potential attackers’ skills, and expanded use of medical devices. Significance: We propose to develop and implement Cyber-Med, a unique collaborative project of Ben-Gurion University of the Negev and the Clalit Health Services Health Maintenance Organization. Cyber-Med focuses on the development of a comprehensive detection framework that relies on a critical attack repository that we aim to create. Cyber-Med will allow researchers and companies to better understand the vulnerabilities and attacks associated with medical devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The Cyber-Med detection framework will consist of two independent, but complementary detection approaches: one for known attacks, and the other for unknown attacks. These modules incorporate novel ideas and algorithms inspired by our team's domains of expertise, including cyber security, biomedical informatics, and advanced machine learning, and temporal data mining techniques. The establishment and maintenance of Cyber-Med’s up-to-date attack repository will strengthen the capabilities of Cyber-Med’s detection framework. Major Findings: Based on our initial survey, we have already found more than 15 types of vulnerabilities and possible attacks aimed at MDs and their eco-system. Many of these attacks target individual patients who use devices such pacemakers and insulin pumps. In addition, such attacks are also aimed at MDs that are widely used by medical centers such as MRIs, CTs, and dialysis engines; the information systems that store patient information; protocols such as DICOM; standards such as HL7; and medical information systems such as PACS. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched against MDs. Very little research has been conducted in order to protect these devices from cyber-attacks, since most of the development and engineering efforts are aimed at the devices’ core medical functionality, the contribution to patients’ healthcare, and the business aspects associated with the medical device.

Keywords: medical device, cyber security, attack, detection, machine learning

Procedia PDF Downloads 355
3922 Sustainable Energy Supply through the Microgrid Concept: A Case Study of University of Nigeria, Nsukka

Authors: Christian Ndubisi Madu, Benjamin C. Ozumba, Ifeanyi E. Madu, Valentine E. Nnadi, Ikenna C. Ezeasor

Abstract:

The ability to generate power and achieve energy security is one of the driving forces behind the emerging ‘microgrid’ concept. Traditional power supply often operates with centralized infrastructure for generating, transmitting and distributing electricity. The inefficiency and the incessant power outages associated with the centralized power supply system in Nigeria has alienated many users who frequently turn to electric power generator sets to power their homes and offices. Such acts are unsustainable and lead to increase in the use of fossil fuels, generation of carbon dioxide emissions and other gases, and noise pollution. They also pose significant risks as they entail random purchases and storage of gasolines which are fire hazards. It is therefore important that organizations rethink their relationships to centralized power suppliers in other to improve energy accessibility and security. This study explores the energy planning processes and learning taking place at the University of Nigeria Enugu Campus as the school lead microgrid feasibility studies in its community. There is need to develop community partners to deal with the issue of energy efficiency and also to create a strategic alliance to confront political, regulatory and economic barriers to locally-based energy planning. Community-based microgrid can help to reduce the cost of adoption and diversify risks. This study offers insights into the ways in which microgrids can further democratize energy planning, procurement, and access, while simultaneously promoting efficiency and sustainability.

Keywords: microgrid, energy efficiency, sustainability, energy security

Procedia PDF Downloads 372
3921 Revised Technology Acceptance Model Framework for M-Commerce Adoption

Authors: Manish Gupta

Abstract:

Following the E-Commerce era, M-Commerce is the next big phase in the technology involvement and advancement. This paper intends to explore how Indian consumers are influenced to adopt the M-commerce. In this paper, the revised Technology Acceptance Model (TAM) has been presented on the basis of the most dominant factors that affect the adoption of M-Commerce in Indian scenario. Furthermore, an analytical questionnaire approach was carried out to collect data from Indian consumers. These collected data were further used for the validation of the presented model. Findings indicate that customization, convenience, instant connectivity, compatibility, security, download speed in M-Commerce affect the adoption behavior. Furthermore, the findings suggest that perceived usefulness and attitude towards M-Commerce are positively influenced by number of M-Commerce drivers (i.e. download speed, compatibility, convenience, security, customization, connectivity, and input mechanism).

Keywords: M-Commerce, perceived usefulness, technology acceptance model, perceived ease of use

Procedia PDF Downloads 310
3920 Descriptive Analysis of Community-Based Needs among Asylum Seekers in New England before and after COVID-19

Authors: Viknesh Kasthuri, Victoria Angenent-Mari, Jade Wexler

Abstract:

The COVID-19 pandemic dramatically altered the landscape of asylum medicine. Brown Human Rights Asylum Clinic (BHRAC) is a medical-student-run asylum clinic that provides pro-bono medical evaluations and forensic affidavits for individuals seeking asylum in New England. After the outbreak of COVID-19 in March 2020, BHRAC experienced numerous changes both in the number of clients requesting services as well as in the resource needs of these clients. Uniquely, BHRAC assesses the needs of clients during their affidavit interview and seeks to address these needs by connecting clients to local community organizations and resources. Data regarding the specific needs of clients range from 2019-present day. Analysis of internal BHRAC’s internal data suggested a small increase in requests for assistance with light and gas (from 5% of total resource requests pre-COVID to 11%), as well as a decrease in requests for mental health services (from 20% of resources pre-COVID to 13% post-COVID). Furthermore, BHRAC witnessed a decline in clinic volume during the second half of 2020. In short, our data suggest that the pandemic affected asylum seekers' access to medico-legal services and the resources they need. Future research with larger sample sizes and in other geographic locations is required to determine the holistic impact of the COVID-19 pandemic on asylum seekers.

Keywords: asylum clinic, asylum medicine, COVID, social determinants of health

Procedia PDF Downloads 103
3919 A Study on Personnel Commitment Factors in Hafes Hospital

Authors: Farzaneh Bayat

Abstract:

Successful and effective presence in regional and global markets along with optimal use of available utilities and proper utilization of new sources for offering desirable services based on customer satisfaction is inevitable. Commitment has a significant role in offering optimal services. Offering high quality job and desirable services to the customers are personnel’s commitment. Thus, Shiraz Chamran Hospital which is affiliated with Shiraz Medical School and is one of the orthopedic poles in southern Iran was studied. This hospital has 750 personnel and physicians which a sample of 200 of them were chosen as the statistic society for a 5 month period from June to November 2009. Main variables in this decision are: responsibility and responsiveness, job security, team work, task autonomy, gradation opportunity, information sharing, payments and commitment. The study approach is descriptive-correlative. With applied and segmental nature of the tests and statistic analysis, the 7 hypotheses were approved with 95% of certainty.

Keywords: commitment, information sharing, responsibility and responsiveness, job security, task autonomy

Procedia PDF Downloads 337
3918 Assessment of Cattle Welfare Traveling Long Distance from Jessore (Indian Border) to Chittagong, Bangladesh

Authors: Mahabub Alam, Mohammad Mahmudul Hassan, M. Hasanuzzaman, M. Ahasanul Hoque

Abstract:

Animals are transported from one place to another for different purposes in Bangladesh. However, the potential effect of long-distance transport on cattle health has not frequently been studied. Therefore, this study was conducted to assess health conditions of cattle transported from a long distance to Chittagong in Bangladesh. A total of 100 adult cattle, regardless of breed and sex, were selected at Benapole live cattle market in Jessore between August and September 2015 for the study. Blood samples were taken from 50 randomly selected cattle at 0 hours before transportation, just after transportation, at 12-16 hours post-conclusion of transportation, and 24 hours after transportation. The external health conditions and injuries of the cattle were assessed by close inspection, and the trader was interviewed using the structured questionnaire. Images of cattle injuries were taken with a camera. The basic internal health of the cattle was evaluated using standard hemato-biochemical tests. Animals were fasted and remained standing within a small space allocation (8-10 sq feet/animal) in the vehicle during transportation. Animals were provided only with paddy straw and water prior to selling at the destination market. The overall frequency of cattle injuries varied significantly (26% before vs. 47% after transportation; p < 0.001). The frequency of different cattle injuries also significantly varied by types such as abrasion (11% vs. 21%; p < 0.05) and barbed wire injury (9% vs. 18%; p < 0.05). Single cattle injury differed significantly (21% vs. 36%; p < 0.001). Cattle health conditions varied significantly (nasal discharge: 15% vs. 28%; p < 0.05; diarrhea: 15% vs. 23%; p < 0.05 and severe dehydration: 8% vs. 20%; p < 0.001). The values of hemoglobin (Hb), total erythrocyte count (TEC), total leukocyte count (TLC), lymphocyte (L), neutrophil (N) and eosinophil (E) varied significantly (p ≤ 0.01) (Hb: 11.1mg/dl vs. 12.3mg/dl; TEC: 4.7 million/ml vs. 5.7million/ml; TLC: 6.2 thousand/ml vs. 7.3 thousand/ml; L: 61.7% vs. 58.1%; N: 29.7% vs. 32.8%; E: 3.8% vs. 4.7%). The values of serum total protein (TP), creatine kinase (CK), triglyceride (TG), calcium (Ca), phosphorus (P) and alkaline phosphatase (ALP) significantly differed (p ≤ 0.05) (TP: 6.8g/dl vs. 8.2g/dl; CK:574.9u/l vs. 1288u/l; TG: 104.7mg/dl vs. 127.7mg/dl; Ca: 11.3mg/dl vs. 13mg/dl; P: 7.3mg/dl vs. 7.6mg/dl; ALP: 303u/l vs. 363u/l). The identified status of external and internal health conditions of the cattle for trading purpose due to long-distance transportation in the present study indicates a high degree of transport stress and poor animal welfare.

Keywords: animal welfare, cattle, external and internal health conditions, transportation

Procedia PDF Downloads 179
3917 Digital Skepticism In A Legal Philosophical Approach

Authors: dr. Bendes Ákos

Abstract:

Digital skepticism, a critical stance towards digital technology and its pervasive influence on society, presents significant challenges when analyzed from a legal philosophical perspective. This abstract aims to explore the intersection of digital skepticism and legal philosophy, emphasizing the implications for justice, rights, and the rule of law in the digital age. Digital skepticism arises from concerns about privacy, security, and the ethical implications of digital technology. It questions the extent to which digital advancements enhance or undermine fundamental human values. Legal philosophy, which interrogates the foundations and purposes of law, provides a framework for examining these concerns critically. One key area where digital skepticism and legal philosophy intersect is in the realm of privacy. Digital technologies, particularly data collection and surveillance mechanisms, pose substantial threats to individual privacy. Legal philosophers must grapple with questions about the limits of state power and the protection of personal autonomy. They must consider how traditional legal principles, such as the right to privacy, can be adapted or reinterpreted in light of new technological realities. Security is another critical concern. Digital skepticism highlights vulnerabilities in cybersecurity and the potential for malicious activities, such as hacking and cybercrime, to disrupt legal systems and societal order. Legal philosophy must address how laws can evolve to protect against these new forms of threats while balancing security with civil liberties. Ethics plays a central role in this discourse. Digital technologies raise ethical dilemmas, such as the development and use of artificial intelligence and machine learning algorithms that may perpetuate biases or make decisions without human oversight. Legal philosophers must evaluate the moral responsibilities of those who design and implement these technologies and consider the implications for justice and fairness. Furthermore, digital skepticism prompts a reevaluation of the concept of the rule of law. In an increasingly digital world, maintaining transparency, accountability, and fairness becomes more complex. Legal philosophers must explore how legal frameworks can ensure that digital technologies serve the public good and do not entrench power imbalances or erode democratic principles. Finally, the intersection of digital skepticism and legal philosophy has practical implications for policy-making. Legal scholars and practitioners must work collaboratively to develop regulations and guidelines that address the challenges posed by digital technology. This includes crafting laws that protect individual rights, ensure security, and promote ethical standards in technology development and deployment. In conclusion, digital skepticism provides a crucial lens for examining the impact of digital technology on law and society. A legal philosophical approach offers valuable insights into how legal systems can adapt to protect fundamental values in the digital age. By addressing privacy, security, ethics, and the rule of law, legal philosophers can help shape a future where digital advancements enhance, rather than undermine, justice and human dignity.

Keywords: legal philosophy, privacy, security, ethics, digital skepticism

Procedia PDF Downloads 43
3916 Evaluating Viability of Solar Tubewell Irrigation Technology

Authors: Junaid N. Chauhdary, Bernard A. Engel, Allah Bakhsh

Abstract:

Solar powered tubewells can be a reliable and affordable source of supplying irrigation water compared with electric or diesel operated tubewells due to frequent load shedding and soaring energy prices. A study was conducted on a solar tubewell installed at the Water Management Research Center (WMRC), University of Agriculture, Faisalabad to investigate the viability of a solar powered tubewell in terms of discharge and benefit cost ratio. The tubewell discharge was 50 m3hr-1 with a total dynamic head of 30 m. The depth of bore was 31 m (14 m blind + 17 m screen) with a casing diameter of 15.2 cm (6 inches). A 3-stage submersible pump of 10.2 cm (4 inch) diameter was lowered in the casing to a depth of 22 m. The pump was powered from 21 solar panels of 200 W capacity each. The tubewell peak discharge was observed as 6 and 7 hr day-1 in winter and summer, respectively. The breakeven analysis of the solar tubewell showed that the payback period of the solar tubewell was 1.5 years of its 10 year usable life with an IRR (internal rate of return) of 69 %. The BCR (benefit cost ratio) of the solar tubewell at 2, 4, 6, and 8 percent discount rate were 3.75, 3.45, 3.19 and 2.96, respectively. The NPV (net present value) of the solar tubewell at 2, 4, 6, and 8 % discount rates were 1.89, 1.65, 1.45 and 1.27 million rupees, respectively. These results indicated that the solar powered tubewells are a viable option as well as environmentally friendly and can be adopted by the farmers due to their affordable payback period.

Keywords: benefit cost ratio, internal rate of return (IRR), net present value (NPV), solar tubewell

Procedia PDF Downloads 206
3915 Composite Distributed Generation and Transmission Expansion Planning Considering Security

Authors: Amir Lotfi, Seyed Hamid Hosseini

Abstract:

During the recent past, due to the increase of electrical energy demand and governmental resources constraints in creating additional capacity in the generation, transmission, and distribution, privatization, and restructuring in electrical industry have been considered. So, in most of the countries, different parts of electrical industry like generation, transmission, and distribution have been separated in order to create competition. Considering these changes, environmental issues, energy growth, investment of private equity in energy generation units and difficulties of transmission lines expansion, distributed generation (DG) units have been used in power systems. Moreover, reduction in the need for transmission and distribution, the increase of reliability, improvement of power quality, and reduction of power loss have caused DG to be placed in power systems. On the other hand, considering low liquidity need, private investors tend to spend their money for DGs. In this project, the main goal is to offer an algorithm for planning and placing DGs in order to reduce the need for transmission and distribution network.

Keywords: planning, transmission, distributed generation, power security, power systems

Procedia PDF Downloads 479
3914 Using Scanning Electron Microscope and Computed Tomography for Concrete Diagnostics of Airfield Pavements

Authors: M. Linek

Abstract:

This article presents the comparison of selected evaluation methods regarding microstructure modification of hardened cement concrete intended for airfield pavements. Basic test results were presented for two pavement quality concrete lots. Analysis included standard concrete used for airfield pavements and modern material solutions based on concrete composite modification. In case of basic grain size distribution of concrete cement CEM I 42,5HSR NA, fine aggregate and coarse aggregate fractions in the form of granite chippings, water and admixtures were considered. In case of grain size distribution of modified concrete, the use of modern modifier as substitute of fine aggregate was suggested. Modification influence on internal concrete structure parameters using scanning electron microscope was defined. Obtained images were compared to the results obtained using computed tomography. Opportunity to use this type of equipment for internal concrete structure diagnostics and an attempt of its parameters evaluation was presented. Obtained test results enabled to reach a conclusion that both methods can be applied for pavement quality concrete diagnostics, with particular purpose of airfield pavements.

Keywords: scanning electron microscope, computed tomography, cement concrete, airfield pavements

Procedia PDF Downloads 338
3913 Impact of Financial Factors on Total Factor Productivity: Evidence from Indian Manufacturing Sector

Authors: Lopamudra D. Satpathy, Bani Chatterjee, Jitendra Mahakud

Abstract:

The rapid economic growth in terms of output and investment necessitates a substantial growth of Total Factor Productivity (TFP) of firms which is an indicator of an economy’s technological change. The strong empirical relationship between financial sector development and economic growth clearly indicates that firms financing decisions do affect their levels of output via their investment decisions. Hence it establishes a linkage between the financial factors and productivity growth of the firms. To achieve the smooth and continuous economic growth over time, it is imperative to understand the financial channel that serves as one of the vital channels. The theoretical or logical argument behind this linkage is that when the internal financial capital is not sufficient enough for the investment, the firms always rely upon the external sources of finance. But due to the frictions and existence of information asymmetric behavior, it is always costlier for the firms to raise the external capital from the market, which in turn affect their investment sentiment and productivity. This kind of financial position of the firms puts heavy pressure on their productive activities. Keeping in view this theoretical background, the present study has tried to analyze the role of both external and internal financial factors (leverage, cash flow and liquidity) on the determination of total factor productivity of the firms of manufacturing industry and its sub-industries, maintaining a set of firm specific variables as control variables (size, age and disembodied technological intensity). An estimate of total factor productivity of the Indian manufacturing industry and sub-industries is computed using a semi-parametric approach, i.e., Levinsohn- Petrin method. It establishes the relationship between financial factors and productivity growth of 652 firms using a dynamic panel GMM method covering the time period between 1997-98 and 2012-13. From the econometric analyses, it has been found that the internal cash flow has a positive and significant impact on the productivity of overall manufacturing sector. The other financial factors like leverage and liquidity also play the significant role in the determination of total factor productivity of the Indian manufacturing sector. The significant role of internal cash flow on determination of firm-level productivity suggests that access to external finance is not available to Indian companies easily. Further, the negative impact of leverage on productivity could be due to the less developed bond market in India. These findings have certain implications for the policy makers to take various policy reforms to develop the external bond market and easily workout through which the financially constrained companies will be able to raise the financial capital in a cost-effective manner and would be able to influence their investments in the highly productive activities, which would help for the acceleration of economic growth.

Keywords: dynamic panel, financial factors, manufacturing sector, total factor productivity

Procedia PDF Downloads 331
3912 Geopolitical Architecture: The Strategic Complex in Indo Pacific Region

Authors: Muzammil Dar

Abstract:

The confluence of trans-national interests and divergent approaches followed by multiple actors has surrounded the Indo-Pacific region with myriad of strategic complexes- Geo-Political, Geo-economic, and security. This paper has thus made a humble attempt to understand the Indo-Pacific strategic predicament from Asia-Pacific perspective. The portmanteau of Indo-Pacific strategic gamble has multiple actors from global powers to regional actors. On the indo-pacific waters, not only flow trade relations, but the tides of conflicts and controversies are striking these actors against each other. The alliance formation and infrastructure building has built-in threat perceptions from rivals vice-versa. The assertiveness of China as a reality and India’s ideological doctrine of peace and friendship, as well as American rebalancing against China, could be seen as clear and bright on the Indo-Pacific strategic portmanteau. ASEAN and Japan, too, have oscillating posturing in the strategic dilemma. The aim and objective of the paper are to sketch out the prospectus and prejudices of Indo-pacific strategic complex.

Keywords: Indo Pacific, Asia Pacific, security and growth for all in the region, SAGAR, ASEAN China

Procedia PDF Downloads 149
3911 Utilization of Secure Wireless Networks as Environment for Learning and Teaching in Higher Education

Authors: Mohammed A. M. Ibrahim

Abstract:

This paper investigate the utilization of wire and wireless networks to be platform for distributed educational monitoring system. Universities in developing countries suffer from a lot of shortages(staff, equipment, and finical budget) and optimal utilization of the wire and wireless network, so universities can mitigate some of the mentioned problems and avoid the problems that maybe humble the education processes in many universities by using our implementation of the examinations system as a test-bed to utilize the network as a solution to the shortages for academic staff in Taiz University. This paper selects a two areas first one quizzes activities is only a test bed application for wireless network learning environment system to be distributed among students. Second area is the features and the security of wireless, our tested application implemented in a promising area which is the use of WLAN in higher education for leering environment.

Keywords: networking wire and wireless technology, wireless network security, distributed computing, algorithm, encryption and decryption

Procedia PDF Downloads 337
3910 Analyzing Environmental Emotive Triggers in Terrorist Propaganda

Authors: Travis Morris

Abstract:

The purpose of this study is to measure the intersection of environmental security entities in terrorist propaganda. To the best of author’s knowledge, this is the first study of its kind to examine this intersection within terrorist propaganda. Rosoka, natural language processing software and frame analysis are used to advance our understanding of how environmental frames function as emotive triggers. Violent jihadi demagogues use frames to suggest violent and non-violent solutions to their grievances. Emotive triggers are framed in a way to leverage individual and collective attitudes in psychological warfare. A comparative research design is used because of the differences and similarities that exist between two variants of violent jihadi propaganda that target western audiences. Analysis is based on salience and network text analysis, which generates violent jihadi semantic networks. Findings indicate that environmental frames are used as emotive triggers across both data sets, but also as tactical and information data points. A significant finding is that certain core environmental emotive triggers like “water,” “soil,” and “trees” are significantly salient at the aggregate level across both data sets. All environmental entities can be classified into two categories, symbolic and literal. Importantly, this research illustrates how demagogues use environmental emotive triggers in cyber space from a subcultural perspective to mobilize target audiences to their ideology and praxis. Understanding the anatomy of propaganda construction is necessary in order to generate effective counter narratives in information operations. This research advances an additional method to inform practitioners and policy makers of how environmental security and propaganda intersect.

Keywords: propaganda analysis, emotive triggers environmental security, frames

Procedia PDF Downloads 138
3909 Assessing the Effects of Climate Change on Wheat Production, Ensuring Food Security and Loss Compensation under Crop Insurance Program in Punjab-Pakistan

Authors: Mirza Waseem Abbas, Abdul Qayyum, Muhammad Islam

Abstract:

Climate change has emerged as a significant threat to global food security, affecting crop production systems worldwide. This research paper aims to examine the specific impacts of climate change on wheat production in Pakistan, Punjab in particular, a country highly dependent on wheat as a staple food crop. Through a comprehensive review of scientific literature, field observations, and data analysis, this study assesses the key climatic factors influencing wheat cultivation and the subsequent implications for food security in the region. A comparison of two subsequent Wheat seasons in Punjab was examined through climatic conditions, area, yield, and production data. From the analysis, it is observed that despite a decrease in the area under cultivation in the Punjab during the Wheat 2023 season, the production and average yield increased due to favorable weather conditions. These uncertain climatic conditions have a direct impact on crop yields. Last year due to heat waves, Wheat crop in Punjab suffered a significant loss. Through crop insurance, Wheat growers were provided with yield loss protection keeping in view the devastating heat wave and floods last year. Under crop insurance by the Government of the Punjab, 534,587 Wheat growers were insured with a $1.6 million premium subsidy. However, due to better climatic conditions, no loss in the yield was recorded in the insured areas. Crop Insurance is one of the suitable options for policymakers to protect farmers against climatic losses in the future as well.

Keywords: climate change, crop insurance, heatwave, wheat yield punjab

Procedia PDF Downloads 80
3908 South Africa and U.S. AFRICOM: Reflections on a Lukewarm Relationship

Authors: Theo Neethling

Abstract:

The United States Africa Command (AFRICOM) was established in 2007 as a military and diplomatic entity and is intended to assist African states and military actors to address their security needs. At the same time, AFRICOM is clearly an extension of US strategic interests on the African continent. The challenge for the US Department of Defence is to project AFRICOM as a cooperative and willing partner. This implies a partner that offers needed services and resources, and supports African security and military priorities with no presumption of having a privileged role in defining the African future. However, one of AFRICOM’s main challenges relates to the point that it has not been able to secure a firm partnership with South Africa as a key player on the continent: South Africa has continuously taken a lukewarm, if not cold, approach towards AFRICOM since its formation. The main aim of this article is to examine and discuss South Africa’s political-military relations with AFRICOM and to assess the underlying reasons currently inhibiting AFRICOM from achieving a fully productive relationship with the South African government.

Keywords: AFRICOM, South African foreign policy, US interests, defence capabilities in Africa, US-Africa relations

Procedia PDF Downloads 301
3907 Smart Surveillance with 5G: A Performance Study in Adama City

Authors: Shenko Chura Aredo, Hailu Belay, Kevin T. Kornegay

Abstract:

In light of Adama City’s smart city development vision, this study thoroughly investigates the performance of smart security systems with Fifth Generation (5G) network capabilities. It can be logistically difficult to install a lot of cabling, particularly in big or dynamic settings. Moreover, latency issues might affect linked systems, making it difficult for them to monitor in real time. Through a focused analysis that employs Adama City as a case study, the performance has been evaluated in terms of spectrum and energy efficiency using empirical data and basic signal processing formulations at different frequency resources. The findings also demonstrate that cameras working at higher 5G frequencies have more capacity than those operating at sub-6 GHz, notwithstanding frequency-related issues. It has also been noted that when the beams of such cameras are adaptively focussed based on the distance of the last cell edge user rather than the maximum cell radius, less energy is required than with conventional fixed power ramping.

Keywords: 5G, energy efficiency, safety, smart security, spectral efficiency

Procedia PDF Downloads 17
3906 Investigation of Fire Damaged Concrete Using Nonlinear Resonance Vibration Method

Authors: Kang-Gyu Park, Sun-Jong Park, Hong Jae Yim, Hyo-Gyung Kwak

Abstract:

This paper attempts to evaluate the effect of fire damage on concrete by using nonlinear resonance vibration method, one of the nonlinear nondestructive method. Concrete exhibits not only nonlinear stress-strain relation but also hysteresis and discrete memory effect which are contained in consolidated materials. Hysteretic materials typically show the linear resonance frequency shift. Also, the shift of resonance frequency is changed according to the degree of micro damage. The degree of the shift can be obtained through nonlinear resonance vibration method. Five exposure scenarios were considered in order to make different internal micro damage. Also, the effect of post-fire-curing on fire-damaged concrete was taken into account to conform the change in internal damage. Hysteretic non linearity parameter was obtained by amplitude-dependent resonance frequency shift after specific curing periods. In addition, splitting tensile strength was measured on each sample to characterize the variation of residual strength. Then, a correlation between the hysteretic non linearity parameter and residual strength was proposed from each test result.

Keywords: nonlinear resonance vibration method, non linearity parameter, splitting tensile strength, micro damage, post-fire-curing, fire damaged concrete

Procedia PDF Downloads 267
3905 Providing a Secure Hybrid Method for Graphical Password Authentication to Prevent Shoulder Surfing, Smudge and Brute Force Attack

Authors: Faraji Sepideh

Abstract:

Nowadays, purchase rate of the smart device is increasing and user authentication is one of the important issues in information security. Alphanumeric strong passwords are difficult to memorize and also owners write them down on papers or save them in a computer file. In addition, text password has its own flaws and is vulnerable to attacks. Graphical password can be used as an alternative to alphanumeric password that users choose images as a password. This type of password is easier to use and memorize and also more secure from pervious password types. In this paper we have designed a more secure graphical password system to prevent shoulder surfing, smudge and brute force attack. This scheme is a combination of two types of graphical passwords recognition based and Cued recall based. Evaluation the usability and security of our proposed scheme have been explained in conclusion part.

Keywords: brute force attack, graphical password, shoulder surfing attack, smudge attack

Procedia PDF Downloads 159
3904 Relationship between Mental Health and Food Access among Healthcare College Students in a Snowy Area in Japan

Authors: Yuki Irie, Shota Ogawa, Hitomi Kosugi, Hiromitsu Shinozaki

Abstract:

Background: Dropout from higher educational institutions is a major problem both for students and institutions, and poor mental health is one of the risk factors. Medical college students are at higher risk of poor mental health than general students because of their hard academic schedules. On the other hand, food insecurity has negative impacts on mental health. The healthcare college of the project site is located heavily snowy area. The students without own vehicles may be at higher risk of food insecurity, especially in the winter season. Therefore, they have many risks to mental health. The aim of the study is to clarify the relationship between mental health and its risk factors to promote students’ mental well-being. Method: A cross-sectional design was used to investigate the relationship between mental health status and lifestyle, including diet and food security among the students (n=421, 147 male, 274 females; 20.7 ± 2.8 years old). Participants were required to answer 3 questionnaires which consisted of diet, lifestyle, food security, and mental health. The survey was conducted during the snowy season from Dec. 2022 to Jan. 2023. Results: Mean mental score was 6.7±4.6 (max. score 27, a higher score means worse mental health). Significant risk factors in mental health were breakfast habit (p=0.02), subjective dietary habit (p=0.00), subjective health (p=0.00), exercise habit (p=0.02), food insecurity in the winter season (p=0.01), and vitamin A intakes (p=0.03). Conclusions: Nutrients intakes are not associated with mental health except vitamin A; however, some other lifestyle factors are significantly associated with mental health. Nutrition doesn’t lead to poor mental health directly; however, the promotion of a healthy lifestyle and improved food security in winter may be effective in better mental health.

Keywords: mental health, winter, lifestyle, students

Procedia PDF Downloads 89
3903 Exploring the Applications of Modular Forms in Cryptography

Authors: Berhane Tewelday Weldhiwot

Abstract:

This research investigates the pivotal role of modular forms in modern cryptographic systems, particularly focusing on their applications in secure communications and data integrity. Modular forms, which are complex analytic functions with rich arithmetic properties, have gained prominence due to their connections to number theory and algebraic geometry. This study begins by outlining the fundamental concepts of modular forms and their historical development, followed by a detailed examination of their applications in cryptographic protocols such as elliptic curve cryptography and zero-knowledge proofs. By employing techniques from analytic number theory, the research delves into how modular forms can enhance the efficiency and security of cryptographic algorithms. The findings suggest that leveraging modular forms not only improves computational performance but also fortifies security measures against emerging threats in digital communication. This work aims to contribute to the ongoing discourse on integrating advanced mathematical theories into practical applications, ultimately fostering innovation in cryptographic methodologies.

Keywords: modular forms, cryptography, elliptic curves, applications, mathematical theory

Procedia PDF Downloads 14
3902 Assessing of Social Comfort of the Russian Population with Big Data

Authors: Marina Shakleina, Konstantin Shaklein, Stanislav Yakiro

Abstract:

The digitalization of modern human life over the last decade has facilitated the acquisition, storage, and processing of data, which are used to detect changes in consumer preferences and to improve the internal efficiency of the production process. This emerging trend has attracted academic interest in the use of big data in research. The study focuses on modeling the social comfort of the Russian population for the period 2010-2021 using big data. Big data provides enormous opportunities for understanding human interactions at the scale of society with plenty of space and time dynamics. One of the most popular big data sources is Google Trends. The methodology for assessing social comfort using big data involves several steps: 1. 574 words were selected based on the Harvard IV-4 Dictionary adjusted to fit the reality of everyday Russian life. The set of keywords was further cleansed by excluding queries consisting of verbs and words with several lexical meanings. 2. Search queries were processed to ensure comparability of results: the transformation of data to a 10-point scale, elimination of popularity peaks, detrending, and deseasoning. The proposed methodology for keyword search and Google Trends processing was implemented in the form of a script in the Python programming language. 3. Block and summary integral indicators of social comfort were constructed using the first modified principal component resulting in weighting coefficients values of block components. According to the study, social comfort is described by 12 blocks: ‘health’, ‘education’, ‘social support’, ‘financial situation’, ‘employment’, ‘housing’, ‘ethical norms’, ‘security’, ‘political stability’, ‘leisure’, ‘environment’, ‘infrastructure’. According to the model, the summary integral indicator increased by 54% and was 4.631 points; the average annual rate was 3.6%, which is higher than the rate of economic growth by 2.7 p.p. The value of the indicator describing social comfort in Russia is determined by 26% by ‘social support’, 24% by ‘education’, 12% by ‘infrastructure’, 10% by ‘leisure’, and the remaining 28% by others. Among 25% of the most popular searches, 85% are of negative nature and are mainly related to the blocks ‘security’, ‘political stability’, ‘health’, for example, ‘crime rate’, ‘vulnerability’. Among the 25% most unpopular queries, 99% of the queries were positive and mostly related to the blocks ‘ethical norms’, ‘education’, ‘employment’, for example, ‘social package’, ‘recycling’. In conclusion, the introduction of the latent category ‘social comfort’ into the scientific vocabulary deepens the theory of the quality of life of the population in terms of the study of the involvement of an individual in the society and expanding the subjective aspect of the measurements of various indicators. Integral assessment of social comfort demonstrates the overall picture of the development of the phenomenon over time and space and quantitatively evaluates ongoing socio-economic policy. The application of big data in the assessment of latent categories gives stable results, which opens up possibilities for their practical implementation.

Keywords: big data, Google trends, integral indicator, social comfort

Procedia PDF Downloads 200
3901 Sailing/Anchoring: Home-making and Aspirations of Non-Majority Female Migrants in Shenzhen, China

Authors: Meiyun Meng

Abstract:

Urban China is now undergoing social transformation based on its rapid economic growth, developing its individualism and feminism. This paper approaches emergent relationships between female individuals’ everyday lives and urban China through internal migration, home-making practices and life-course perspectives. Focusing on Shenzhen, it explores how ten highly educated female migrants pursue aspirations of accommodating ‘non-majority’ identities, such as lesbians, divorced, or childless women, in urban China. Based on life stories and home video tours, this paper finds how these women develop non-majority lifestyles to negotiate their aspirations. On the one hand, they ‘sail’ away from past/present situations where collectivist and hetero-patriarchal norms marginalised their non-majority identities. On the other hand, they ‘anchor’ in places where ‘new’ socio-cultural contexts allow female individuals to pursue alternative opportunities and preferential lifestyles. This paper provides fresh insights to interpret the social transformation in urban China, under the collectivist culture and hetero-patriarchal norms, through the lens of individual everyday home-making practices.

Keywords: home-making practices, internal migration, highly educated women, shenzhen, transforming urban China

Procedia PDF Downloads 87
3900 Effect of Tensile Strain on Microstructure of Irradiated Core Internal Material

Authors: Hygreeva Kiran Namburi, Anna Hojna, Edita Lecianova, Fencl Zdenek

Abstract:

Irradiation Assisted Stress Corrosion Cracking [IASCC] is one of the most significant environmental degradation in the internal components made from Austenitic stainless steel. This mechanism is still not fully understood and there are no suitable criteria for prediction of the damage during operation. In this work, core basket material 08Ch18N10T austenitic stainless steel acquired from decommissioned NPP Nord / Greifswald Unit 1, VVER 440-230 type, operated for 15 years and irradiated at 5.2 dpa is studied. This material was tensile tested at two different test temperatures and strain rates in air and at the elevated temperature under the water environment. SEM observations of the fracture surface documented ductile fracture of the samples tested in air, but areas of IASCC tested in water. This paper emphasizes on the microscopic examination results from the mechanically tested samples to determine the underlying IASCC physical damage process. TEM observations of thin foils made from the gauge sections that are closer to the fractured surface of the specimen aimed to find variances in interaction of dislocations and grain boundaries owing to different test conditions.

Keywords: irradiation assisted stress corrosion cracking, core basket material, SEM observations of the fracture surface, microscopic examination results

Procedia PDF Downloads 348
3899 A Socio-Technical Approach to Cyber-Risk Assessment

Authors: Kitty Kioskli, Nineta Polemi

Abstract:

Evaluating the levels of cyber-security risks within an enterprise is most important in protecting its information system, services and all its digital assets against security incidents (e.g. accidents, malicious acts, massive cyber-attacks). The existing risk assessment methodologies (e.g. eBIOS, OCTAVE, CRAMM, NIST-800) adopt a technical approach considering as attack factors only the capability, intention and target of the attacker, and not paying attention to the attacker’s psychological profile and personality traits. In this paper, a socio-technical approach is proposed in cyber risk assessment, in order to achieve more realistic risk estimates by considering the personality traits of the attackers. In particular, based upon principles from investigative psychology and behavioural science, a multi-dimensional, extended, quantifiable model for an attacker’s profile is developed, which becomes an additional factor in the cyber risk level calculation.

Keywords: attacker, behavioural models, cyber risk assessment, cybersecurity, human factors, investigative psychology, ISO27001, ISO27005

Procedia PDF Downloads 164
3898 Flexible Current Collectors for Printed Primary Batteries

Authors: Vikas Kumar

Abstract:

Portable batteries are reliable source of mobile energy to power smart wearable electronics, medical devices, communications, and others internet of thing (IoT) devices. There is a continuous increase in demand for thinner, more flexible battery with high energy density and reliability to meet the requirement. For a flexible battery, factors that affect these properties are the stability of current collectors, electrode materials and their interfaces with the corrosive electrolytes. State-of-the-art conventional and flexible batteries utilise carbon as an electrode and current collectors which cause high internal resistance (~100 ohms) and limit the peak current to ~1mA. This makes them unsuitable for a wide range of applications. Replacing the carbon parts with metallic components would reduce the internal resistance (and hence reduce parasitic loss), but significantly increases the risk of corrosion due to galvanic interactions within the battery. To overcome these challenges, low cost electroplated nickel (Ni) on copper (Cu) was studied as a potential anode current collector for a zinc-manganese oxide primary battery with different concentration of NH4Cl/ZnCl2 electrolyte. Using electrical impedance spectroscopy (EIS), we monitored the open circuit potential (OCP) of electroplated nickel (different thicknesses) in different concentration of electrolytes to optimise the thickness of Ni coating. Our results show that electroless Ni coating suffer excessive corrosion in these electrolytes. Corrosion rates of Ni coatings for different concentrations of electrolytes have been calculated with Tafel analysis. These results suggest that for electroplated Ni, channelling and/or open porosity is a major issue, which was confirmed by morphological analysis. These channels are an easy pathway for electrolyte to penetrate thorough Ni to corrode the Ni/Cu interface completely. We further investigated the incorporation of a special printed graphene layer on Ni to provide corrosion protection in this corrosive electrolyte medium. We find that the incorporation of printed graphene layer provides the corrosion protection to the Ni and enhances the chemical bonding between the active materials and current collector and also decreases the overall internal resistance of the battery system.

Keywords: corrosion, electrical impedance spectroscopy, flexible battery, graphene, metal current collector

Procedia PDF Downloads 127
3897 The Attentional Focus Impact on the Decision Making in Three-Game Situations in Tennis

Authors: Marina Tsetseli, Eleni Zetou, Maria Michalopoulou, Nikos Vernadakis

Abstract:

Game performance, besides the accuracy and the quality skills execution, depends heavily on where the athletes will focus their attention while performing a skill. The purpose of the present study was to examine and compare the effect of internal and external focus of attention instructions on the decision making in tennis at players 8-9 years old (M=8.4, SD=0.49). The participants (N=40) were divided into two groups and followed an intervention training program that lasted 4 weeks; first group (N=20) under internal focus of attention instructions and the second group (N=20) under external focus of attention instructions. Three measurements took place (pre-test, post-test, and retention test) in which the participants were video recorded while playing matches in real scoring conditions. GPAI (Game Performance Assessment Instrument) was used to evaluate decision making in three game situations; service, return of the service, baseline game. ANOVA repeated measures (2 groups x 3 measurements) revealed a significant interaction between groups and measurements. Specifically, the data analysis showed superiority of the group that was instructed to focus externally. The high scores of the external attention group were maintained at the same level at the third measurement as well, which indicates that the impact was concerning not only performance but also learning. Thus, cues that lead to an external focus of attention enhance the decision-making skill and therefore the game performance of the young tennis players.

Keywords: decision making, evaluation, focus of attention, game performance, tennis

Procedia PDF Downloads 348
3896 Internal Cycles from Hydrometric Data and Variability Detected Through Hydrological Modelling Results, on the Niger River, over 1901-2020

Authors: Salif Koné

Abstract:

We analyze hydrometric data at the Koulikoro station on the Niger River; this basin drains 120600 km2 and covers three countries in West Africa, Guinea, Mali, and Ivory Coast. Two subsequent decadal cycles are highlighted (1925-1936 and 1929-1939) instead of the presumed single decadal one from literature. Moreover, the observed hydrometric data shows a multidecadal 40-year period that is confirmed when graphing a spatial coefficient of variation of runoff over decades (starting at 1901-1910). Spatial runoff data are produced on 48 grids (0.5 degree by 0.5 degree) and through semi-distributed versions of both SimulHyd model and GR2M model - variants of a French Hydrologic model – standing for Genie Rural of 2 parameters at monthly time step. Both extremal decades in terms of runoff coefficient of variation are confronted: 1951-1960 has minimal coefficient of variation, and 1981-1990 shows the maximal value of it during the three months of high-water level (August, September, and October). The mapping of the relative variation of these two decadal situations allows hypothesizing as following: the scale of variation between both extremal situations could serve to fix boundary conditions for further simulations using data from climate scenario.

Keywords: internal cycles, hydrometric data, niger river, gr2m and simulhyd framework, runoff coefficient of variation

Procedia PDF Downloads 92
3895 Influence of Annealing on the Mechanical Properties of Polyester-Cotton Friction Spun Yarn

Authors: Sujit Kumar Sinha, R. Chattopadhyay

Abstract:

In the course of processing phases and use, fibres, yarns, or fabrics are subjected to a variety of stresses and strains, which cause the development of internal stresses. Given an opportunity, these inherent stresses try to bring back the structure to the original state. As an example, a twisted yarn always shows a tendency to untwist whenever its one end is made free. If the yarn is not held under tension, it may form snarls due to the presence of excessive torque. The running performance of such yarn or thread may, therefore, get negatively affected by it, as a snarl may not pass through the knitting or sewing needle smoothly, leading to an end break. A fabric shows a tendency to form wrinkles whenever squeezed. It may also shrink when brought to a relaxed state. In order to improve performance (i.e., dimensional stability or appearance), stabilization of the structure is needed. The stabilization can be attained through the release of internal stresses, which can be brought about by the process of annealing and/or other finishing treatments. When a fabric is subjected to heat, a change in the properties of the fibers, yarns, and fabric is expected. The degree to which the properties are affected would depend upon the condition of heat treatment and on the properties & structure of fibres, yarns, and fabric. In the present study, an attempt has been made to investigate the effect of annealing treatment on the properties of polyester cotton yarns with varying sheath structures.

Keywords: friction spun yarn, annealing, tenacity, structural integrity, decay

Procedia PDF Downloads 63
3894 USA Commercial Pilots’ Views of Crew Resource Management, Social Desirability, and Safety Locus of Control

Authors: Stephen Vera, Tabitha Black, Charalambos Cleanthous, Ryan Sain

Abstract:

A gender comparison of USA commercial pilots’ demographics and views of CRM, social desirability and locus of control were surveyed. The Aviation safety locus of control (ASLOC) was used to measure external (ASLOC-E) or internal (ASLOC-I) aviation safety locus of control. The gender differences were explored using the ASLOC scores as a categorical variable. A differential comparison of crew resource management (CRM), based on the Federal Aviation Administration’s (FAA) guidelines was conducted. The results indicated that the proportion of female to male respondents matches the current ratio of USA commercial pilots. Moreover, there were no significant differences regarding overall education and the total number of communication classes one took. Regarding CRM issues, there were no significant differences on their views regarding the roles of the PIC, stress, time management, and managing a flight team. The females scored significantly lower on aeronautical decision making (ADM) and communications. There were no significant differences on either the Balanced Inventory of Desirable Responding (BIDR) impression management (IM) or self-deceptive enhancement (SDE). Although there were no overall significant differences on the ASLOC, the females did score higher on the internal subscale than did the males. An additional comparison of socially desirable responding indicates that all scores may be invalid, especially from the female respondents.

Keywords: social desirability, safety locus of control, crew resource management, commercial pilots

Procedia PDF Downloads 254