Search results for: threat intelligence
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2400

Search results for: threat intelligence

1200 21st Century Gunboat Diplomacy and Strategic Sea Areas

Authors: Mustafa Avsever

Abstract:

Throughout history, states have attached great importance to seas in terms of economic and security. Advanced civilizations have always founded in coastal regions. Over time, human being has tended to trade and naturally always aimed get more and more. Seas by covering 71% of the earth, provide the greatest economic opportunities for access to raw material resources and the world market. As a result, seas have become the most important areas of conflict over the course of time. Coastal states, use seas as a tool for defense zone, trade, marine transportation and power transfer, they have acquired colonies overseas and increased their capital, raw materials and labor. Societies, have increased their economic prosperity, though their navies in order to retain their welfare and achieve their foreign policy objectives. Sometimes they have imposed their demands through the use or threat of limited naval force in accordance with their interests that is gunboat diplomacy. Today we can see samples of gunboat diplomacy used in the Eastern Mediterranean, during Ukraine crisis, in dispute between North Korea and South Korea and the ongoing power struggle in Asia-Pacific. Gunboat diplomacy has been and continues to be applied consistently in solving problems by the stronger side of the problem. The purpose of this article is to examine using navy under the gunboat diplomacy as an active instrument of foreign policy and security policy and reveal the strategic sea areas in which gunboat diplomacy is used effectively in the matrix of international politics in the 21st century.

Keywords: gunboat diplomacy, maritime strategy, sea power, strategic sea lands

Procedia PDF Downloads 419
1199 Predicting Response to Cognitive Behavioral Therapy for Psychosis Using Machine Learning and Functional Magnetic Resonance Imaging

Authors: Eva Tolmeijer, Emmanuelle Peters, Veena Kumari, Liam Mason

Abstract:

Cognitive behavioral therapy for psychosis (CBTp) is effective in many but not all patients, making it important to better understand the factors that determine treatment outcomes. To date, no studies have examined whether neuroimaging can make clinically useful predictions about who will respond to CBTp. To this end, we used machine learning methods that make predictions about symptom improvement at the individual patient level. Prior to receiving CBTp, 22 patients with a diagnosis of schizophrenia completed a social-affective processing task during functional MRI. Multivariate pattern analysis assessed whether treatment response could be predicted by brain activation responses to facial affect that was either socially threatening or prosocial. The resulting models did significantly predict symptom improvement, with distinct multivariate signatures predicting psychotic (r=0.54, p=0.01) and affective (r=0.32, p=0.05) symptoms. Psychotic symptom improvement was accurately predicted from relatively focal threat-related activation across hippocampal, occipital, and temporal regions; affective symptom improvement was predicted by a more dispersed profile of responses to prosocial affect. These findings enrich our understanding of the neurobiological underpinning of treatment response. This study provides a foundation that will hopefully lead to greater precision and tailoring of the interventions offered to patients.

Keywords: cognitive behavioral therapy, machine learning, psychosis, schizophrenia

Procedia PDF Downloads 261
1198 Medical Advances in Diagnosing Neurological and Genetic Disorders

Authors: Simon B. N. Thompson

Abstract:

Retinoblastoma is a rare type of childhood genetic cancer that affects children worldwide. The diagnosis is often missed due to lack of education and difficulty in presentation of the tumor. Frequently, the tumor on the retina is noticed by photography when the red-eye flash, commonly seen in normal eyes, is not produced. Instead, a yellow or white colored patch is seen or the child has a noticeable strabismus. Early detection can be life-saving though often results in removal of the affected eye. Remaining functioning in the healthy eye when the child is young has resulted in super-vision and high or above-average intelligence. Technological advancement of cameras has helped in early detection. Brain imaging has also made possible early detection of neurological diseases and, together with the monitoring of cortisol levels and yawning frequency, promises to be the next new early diagnostic tool for the detection of neurological diseases where cortisol insufficiency is particularly salient, such as multiple sclerosis and Cushing’s disease.

Keywords: cortisol, neurological disease, retinoblastoma, Thompson cortisol hypothesis, yawning

Procedia PDF Downloads 376
1197 DURAFILE: A Collaborative Tool for Preserving Digital Media Files

Authors: Santiago Macho, Miquel Montaner, Raivo Ruusalepp, Ferran Candela, Xavier Tarres, Rando Rostok

Abstract:

During our lives, we generate a lot of personal information such as photos, music, text documents and videos that link us with our past. This data that used to be tangible is now digital information stored in our computers, which implies a software dependence to make them accessible in the future. Technology, however, constantly evolves and goes through regular shifts, quickly rendering various file formats obsolete. The need for accessing data in the future affects not only personal users but also organizations. In a digital environment, a reliable preservation plan and the ability to adapt to fast changing technology are essential for maintaining data collections in the long term. We present in this paper the European FP7 project called DURAFILE that provides the technology to preserve media files for personal users and organizations while maintaining their quality.

Keywords: artificial intelligence, digital preservation, social search, digital preservation plans

Procedia PDF Downloads 430
1196 Smoker Recognition from Lung X-Ray Images Using Convolutional Neural Network

Authors: Moumita Chanda, Md. Fazlul Karim Patwary

Abstract:

Smoking is one of the most popular recreational drug use behaviors, and it contributes to birth defects, COPD, heart attacks, and erectile dysfunction. To completely eradicate this disease, it is imperative that it be identified and treated. Numerous smoking cessation programs have been created, and they demonstrate how beneficial it may be to help someone stop smoking at the ideal time. A tomography meter is an effective smoking detector. Other wearables, such as RF-based proximity sensors worn on the collar and wrist to detect when the hand is close to the mouth, have been proposed in the past, but they are not impervious to deceptive variables. In this study, we create a machine that can discriminate between smokers and non-smokers in real-time with high sensitivity and specificity by watching and collecting the human lung and analyzing the X-ray data using machine learning. If it has the highest accuracy, this machine could be utilized in a hospital, in the selection of candidates for the army or police, or in university entrance.

Keywords: CNN, smoker detection, non-smoker detection, OpenCV, artificial Intelligence, X-ray Image detection

Procedia PDF Downloads 61
1195 The Impact of Artificial Intelligence on the Behavior of Children and Autism

Authors: Sara Fayez Fawzy Mikhael

Abstract:

Inclusive education services for students with Autism remains in its early developmental stages in Thailand. Despite many more children with autism are attending schools since the Thai government introduced the Education Provision for People with Disabilities Act in 2008, the services students with autism and their families receive are generally lacking. This quantitative study used Attitude and Preparedness to Teach Students with Autism Scale (APTSAS) to investigate 110 primary school teachers’ attitude and preparedness to teach students with autism in the general education classroom. Descriptive statistical analysis of the data found that student behavior was the most significant factor in building teachers’ negative attitudes students with autism. The majority of teachers also indicated that their pre-service education did not prepare them to meet the learning needs of children with autism in particular, those who are non-verbal. The study is significant and provides direction for enhancing teacher education for inclusivity in Thailand.

Keywords: attitude, autism, teachers, thailandsports activates, movement skills, motor skills

Procedia PDF Downloads 65
1194 Parental Investment in Education: A Pathway for the Children's Access to Quality Education

Authors: Tukur Husaini Nahuche

Abstract:

The parent resources play a vital role in the life of the offspring. It help give children basic necessities of life like food, clothing, and housing. In a like manner financial assets allow parents to move into neighborhood with more affluent school systems, to pay school bills, purchase expensive technologies like personal computer, save money for tutoring books, magazines, journals, Newspapers etc. Making of proper provision in the home environment conducive for learning after school hours and creation of other outdoor activities for them are what necessitate in enhancing and accelerating children’s learning opportunities. Indeed, this paper intends to discuss parental investment in education, parent income resources, parental education, occupation, and income as relatively influencing children’s access to quality education. With the hope that families would provide equal opportunities for children irrespective of their sex, intelligence, subject choice,etc.

Keywords: parental investment, children's access, quality education

Procedia PDF Downloads 533
1193 Wireless Sensor Anomaly Detection Using Soft Computing

Authors: Mouhammd Alkasassbeh, Alaa Lasasmeh

Abstract:

We live in an era of rapid development as a result of significant scientific growth. Like other technologies, wireless sensor networks (WSNs) are playing one of the main roles. Based on WSNs, ZigBee adds many features to devices, such as minimum cost and power consumption, and increasing the range and connect ability of sensor nodes. ZigBee technology has come to be used in various fields, including science, engineering, and networks, and even in medicinal aspects of intelligence building. In this work, we generated two main datasets, the first being based on tree topology and the second on star topology. The datasets were evaluated by three machine learning (ML) algorithms: J48, meta.j48 and multilayer perceptron (MLP). Each topology was classified into normal and abnormal (attack) network traffic. The dataset used in our work contained simulated data from network simulation 2 (NS2). In each database, the Bayesian network meta.j48 classifier achieved the highest accuracy level among other classifiers, of 99.7% and 99.2% respectively.

Keywords: IDS, Machine learning, WSN, ZigBee technology

Procedia PDF Downloads 524
1192 The Impact of Artificial Intelligence on Autism Attitude and Skills

Authors: Samwail Fahmi Francis Yacoub

Abstract:

Inclusive education services for students with Autism remains in its early developmental stages in Thailand. Despite many more children with autism are attending schools since the Thai government introduced the Education Provision for People with Disabilities Act in 2008, the services students with autism and their families receive are generally lacking. This quantitative study used Attitude and Preparedness to Teach Students with Autism Scale (APTSAS) to investigate 110 primary school teachers’ attitude and preparedness to teach students with autism in the general education classroom. Descriptive statistical analysis of the data found that student behavior was the most significant factor in building teachers’ negative attitudes students with autism. The majority of teachers also indicated that their pre-service education did not prepare them to meet the learning needs of children with autism in particular, those who are non-verbal. The study is significant and provides direction for enhancing teacher education for inclusivity in Thailand.

Keywords: attitude, autism, teachers, movement skills, motor skills, children, behavior.

Procedia PDF Downloads 28
1191 Behavioral Changes and Gill Histopathological Alterations of Red Hybrid Tilapia (Oreochromis sp.) Exposed to Glyphosate Herbicide

Authors: Abubakar Muhammad Umar, Nur Adeela Yasid, Hassan Mohd Daud, Mohd Yunus Abd Shukor

Abstract:

Glyphosate [N-(phosphonomethyl) glycine] is among the most broadly and generally recognized broad-spectrum herbicides used in agriculture due to its low cost and effectiveness in weed management. The pollution of glyphosate in the aquatic environment can be via water run-off from agricultural lands, or by spray drift, aerial spraying or due to industrial discharge, which may be seen as a threat to aquatic biota. Fish is one of the best organisms to study the toxicological aspects of glyphosate. A 49 days experiment was conducted under laboratory condition to ascertain the effects of technical grade glyphosate on behaviour and histopathological conditions in the gills of red hybrid tilapia using light inverted microscope. Air gasping, erratic swimming, fin movement, mucus secretion, hemorrhages and loss of scales were observed as behavioural changes in the exposed fish. There was no any histopathological complication observed in the gill of the control fish, but various level of alterations were seen in the gills of the fish exposed to glyphosate herbicide. These include lifting of primary lamella, congestion of secondary lamella as well as hyperplasia in both primary and secondary gill lamella and hypertrophy of secondary gill lamella. Based on the findings of this study, glyphosate herbicide exerts behavioural and histopathological changes in the gill of red hybrid tilapia, and therefore the fish is considered as good bioindicator in aquatic environment monitoring. Excessive usage of glyphosate herbicide near aquatic habitats should be discouraged.

Keywords: glyphosate, behavioral, histopathological, tilapia

Procedia PDF Downloads 6
1190 Efficient Credit Card Fraud Detection Based on Multiple ML Algorithms

Authors: Neha Ahirwar

Abstract:

In the contemporary digital era, the rise of credit card fraud poses a significant threat to both financial institutions and consumers. As fraudulent activities become more sophisticated, there is an escalating demand for robust and effective fraud detection mechanisms. Advanced machine learning algorithms have become crucial tools in addressing this challenge. This paper conducts a thorough examination of the design and evaluation of a credit card fraud detection system, utilizing four prominent machine learning algorithms: random forest, logistic regression, decision tree, and XGBoost. The surge in digital transactions has opened avenues for fraudsters to exploit vulnerabilities within payment systems. Consequently, there is an urgent need for proactive and adaptable fraud detection systems. This study addresses this imperative by exploring the efficacy of machine learning algorithms in identifying fraudulent credit card transactions. The selection of random forest, logistic regression, decision tree, and XGBoost for scrutiny in this study is based on their documented effectiveness in diverse domains, particularly in credit card fraud detection. These algorithms are renowned for their capability to model intricate patterns and provide accurate predictions. Each algorithm is implemented and evaluated for its performance in a controlled environment, utilizing a diverse dataset comprising both genuine and fraudulent credit card transactions.

Keywords: efficient credit card fraud detection, random forest, logistic regression, XGBoost, decision tree

Procedia PDF Downloads 39
1189 Reverse Supply Chain Analysis of Lithium-Ion Batteries Considering Economic and Environmental Aspects

Authors: Aravind G., Arshinder Kaur, Pushpavanam S.

Abstract:

There is a strong emphasis on shifting to electric vehicles (EVs) throughout the globe for reducing the impact on global warming following the Paris climate accord. Lithium-ion batteries (LIBs) are predominantly used in EVs, and these can be a significant threat to the environment if not disposed of safely. Lithium is also a valuable resource not widely available. There are several research groups working on developing an efficient recycling process for LIBs. Two routes - pyrometallurgical and hydrometallurgical processes have been proposed for recycling LIBs. In this paper, we focus on life cycle assessment (LCA) as a tool to quantify the environmental impact of these recycling processes. We have defined the boundary of the LCA to include only the recycling phase of the end-of-life (EoL) of the battery life cycle. The analysis is done assuming ideal conditions for the hydrometallurgical and a combined hydrometallurgical and pyrometallurgical process in the inventory analysis. CML-IA method is used for quantifying the impact assessment across eleven indicators. Our results show that cathode, anode, and foil contribute significantly to the impact. The environmental impacts of both hydrometallurgical and combined recycling processes are similar across all the indicators. Further, the results of LCA are used in developing a multi-objective optimization model for the design of lithium-ion battery recycling network. Greenhouse gas emissions and cost are the two parameters minimized for the optimization study.

Keywords: life cycle assessment, lithium-ion battery recycling, multi-objective optimization, network design, reverse supply chain

Procedia PDF Downloads 135
1188 New Approach for Load Modeling

Authors: Slim Chokri

Abstract:

Load forecasting is one of the central functions in power systems operations. Electricity cannot be stored, which means that for electric utility, the estimate of the future demand is necessary in managing the production and purchasing in an economically reasonable way. A majority of the recently reported approaches are based on neural network. The attraction of the methods lies in the assumption that neural networks are able to learn properties of the load. However, the development of the methods is not finished, and the lack of comparative results on different model variations is a problem. This paper presents a new approach in order to predict the Tunisia daily peak load. The proposed method employs a computational intelligence scheme based on the Fuzzy neural network (FNN) and support vector regression (SVR). Experimental results obtained indicate that our proposed FNN-SVR technique gives significantly good prediction accuracy compared to some classical techniques.

Keywords: neural network, load forecasting, fuzzy inference, machine learning, fuzzy modeling and rule extraction, support vector regression

Procedia PDF Downloads 418
1187 Investigating Knowledge Management in Financial Organisation: Proposing a New Model for Implementing Knowledge Management

Authors: Ziba R. Tehrani, Sanaz Moayer

Abstract:

In the age of the knowledge-based economy, knowledge management has become a key factor in sustainable competitive advantage. Knowledge management is discovering, acquiring, developing, sharing, maintaining, evaluating, and using right knowledge in right time by right person in organization; which is accomplished by creating a right link between human resources, information technology, and appropriate structure, to achieve organisational goals. Studying knowledge management financial institutes shows the knowledge management in banking system is not different from other industries but because of complexity of bank’s environment, the implementation is more difficult. The bank managers found out that implementation of knowledge management will bring many advantages to financial institutes, one of the most important of which is reduction of threat to lose subsequent information of personnel job quit. Also Special attention to internal conditions and environment of the financial institutes and avoidance from copy-making in designing the knowledge management is a critical issue. In this paper, it is tried first to define knowledge management concept and introduce existing models of knowledge management; then some of the most important models which have more similarities with other models will be reviewed. In second step according to bank requirements with focus on knowledge management approach, most major objectives of knowledge management are identified. For gathering data in this stage face to face interview is used. Thirdly these specified objectives are analysed with the response of distribution of questionnaire which is gained through managers and expert staffs of ‘Karafarin Bank’. Finally based on analysed data, some features of exiting models are selected and a new conceptual model will be proposed.

Keywords: knowledge management, financial institute, knowledge management model, organisational knowledge

Procedia PDF Downloads 343
1186 Identification of Workplace Hazards of Underground Coal Mines

Authors: Madiha Ijaz, Muhammad Akram, Sima Mir

Abstract:

Underground mining of coal is carried out manually in Pakistan. Exposure to ergonomic hazards (musculoskeletal disorders) are very common among the coal cutters of these mines. Cutting coal in narrow spaces poses a great threat to both upper and lower limbs of these workers. To observe the prevalence of such hazards, a thorough study was conducted on 600 workers from 30 mines (20 workers from 1 mine), located in two districts of province Punjab, Pakistan. Rapid Upper Limb Assessment sheet and Rapid Entire Body Assessment sheet were used for the study along with a standard Nordic Musculoskeleton disorder questionnaire. SPSS, 25, software was used for data analysis on upper and lower limb disorders, and regression analysis models were run for upper and lower back pain. According to the results obtained, it was found that work stages (drilling & blasting, coal cutting, timbering & supporting, etc.), wok experience and number of repetitions performed/minute were significant (with p-value 0.00,0.004 and 0.009, respectively) for discomfort in upper and lower limb. Age got p vale 0.00 for upper limb and 0.012 for lower limb disorder. The task of coal cutting was strongly associated with the pain in upper back (with odd ratios13.21, 95% confidence interval (CI)14.0-21.64)) and lower back pain (3.7, 95% confidence interval 1.3-4.2). scored on RULA and REBA sheets, every work-stage was ranked at 7-highest level of risk involved. Workers were young (mean value of age= 28.7 years) with mean BMI 28.1 kg/m2

Keywords: workplace hazards, ergonomic disorders, limb disorders, MSDs.

Procedia PDF Downloads 65
1185 Hydrodeoxygenation of Furfural over RU Sub-Nano Particles Supported on Al₂O₃-SIO₂ Mixed Oxides

Authors: Chaima Zoulikha Tabet Zatla, Nihel Dib, Sumeya Bedrane, Juan Carlos Hernandez Garrido, Redouane Bachir, Miguel Angel Cauqui, Jose Juan Calvino Gamez

Abstract:

These last year's our planet has witnessed global warming, which is a serious threat to our lives; it has many causes, such as the CO₂ excess in the atmosphere that results from our activity, for the purpose of living in a neater and better environment, working and improving an eco-responsible energy system is a must. Valorization of biomass to produce biofuels is among the most compelling routes to decrease air pollution without considerable modification in current vehicle technology. Effective transformation of lignocellulosic biomass-derived compounds into liquid fuels and value-added chemicals is an economically viable solution. Presently, very competitive technics for the conversion of lignocellulosic biomass into platform chemicals, such as furfural and Hydroxymethylfurfural (HMF), are used. Furfural (C₅H₄O₂) is a major hemi cellulosic biomass-derived platform molecule. In our work, we focus on the valorization of lignocellulosic biomass derivative furfural that is transformed into biofuel through a hydrodeoxygenation reaction in general and involving a catalytic process. In order to get to this point, we are synthesizing and characterizing a series of catalysts with different amounts of Ru (0.5%, 1% and 2%) supported on alumina-silica mixed oxides with various molar ratios (Si/Al = 2.5; 5; 7; 10; 15). These catalysts will be characterized by numerous technics such as N₂ adsorption/desorption, Pyridine adsorption (acidity measure), FTIR, X-rays diffraction, AAS, TEM and SEM.

Keywords: furfural, ruthenium, silica-alumina, biomass, biofuel

Procedia PDF Downloads 65
1184 Smart Airport: Application of Internet of Things for Confronting Airport Challenges

Authors: Ali Safaeianpour, Nima Shamandi

Abstract:

As air traffic expands, many airports have evolved into transit centers for people, information, and commerce, and technology implementation is an absolute part of airport development. Several challenges are in the way of implementing technology in an airport. Airport 4.0 proposes the "Smart Airport" concept, which focuses on using modern technologies such as Big Data, the Internet of Things (IoT), advanced biometric systems, blockchain, and cloud computing to alter and enhance passengers' journeys. Several common IoT concrete topics as partial keys to smart airports are discussed and introduced, ranging from automated check-in systems to exterior tracking processes, with the goal of enlightening more and more insightful ideas and proposals about smart airport solutions. IoT will dramatically alter people's lives by infusing intelligence, boosting the quality of life, and assembling it smarter. This paper reviews the approaches to transforming an airport into a smart airport and describes several enabling components of IoT and challenges that can hinder the implementation of a smart airport's function, which require to be addressed.

Keywords: airport 4.0, digital airport, smart airport, IoT

Procedia PDF Downloads 96
1183 Settlement Prediction for Tehran Subway Line-3 via FLAC3D and ANFIS

Authors: S. A. Naeini, A. Khalili

Abstract:

Nowadays, tunnels with different applications are developed, and most of them are related to subway tunnels. The excavation of shallow tunnels that pass under municipal utilities is very important, and the surface settlement control is an important factor in the design. The study sought to analyze the settlement and also to find an appropriate model in order to predict the behavior of the tunnel in Tehran subway line-3. The displacement in these sections is also determined by using numerical analyses and numerical modeling. In addition, the Adaptive Neuro-Fuzzy Inference System (ANFIS) method is utilized by Hybrid training algorithm. The database pertinent to the optimum network was obtained from 46 subway tunnels in Iran and Turkey which have been constructed by the new Austrian tunneling method (NATM) with similar parameters based on type of their soil. The surface settlement was measured, and the acquired results were compared to the predicted values. The results disclosed that computing intelligence is a good substitute for numerical modeling.

Keywords: settlement, Subway Line, FLAC3D, ANFIS Method

Procedia PDF Downloads 207
1182 A Review Paper on Data Security in Precision Agriculture Using Internet of Things

Authors: Tonderai Muchenje, Xolani Mkhwanazi

Abstract:

Precision agriculture uses a number of technologies, devices, protocols, and computing paradigms to optimize agricultural processes. Big data, artificial intelligence, cloud computing, and edge computing are all used to handle the huge amounts of data generated by precision agriculture. However, precision agriculture is still emerging and has a low level of security features. Furthermore, future solutions will demand data availability and accuracy as key points to help farmers, and security is important to build robust and efficient systems. Since precision agriculture comprises a wide variety and quantity of resources, security addresses issues such as compatibility, constrained resources, and massive data. Moreover, conventional protection schemes used in the traditional internet may not be useful for agricultural systems, creating extra demands and opportunities. Therefore, this paper aims at reviewing state of the art of precision agriculture security, particularly in open field agriculture, discussing its architecture, describing security issues, and presenting the major challenges and future directions.

Keywords: precision agriculture, security, IoT, EIDE

Procedia PDF Downloads 74
1181 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours

Authors: Elham Rajabian

Abstract:

The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.

Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture

Procedia PDF Downloads 78
1180 A Multi-Science Study of Modern Synergetic War and Its Information Security Component

Authors: Alexander G. Yushchenko

Abstract:

From a multi-science point of view, we analyze threats to security resulting from globalization of international information space and information and communication aggression of Russia. A definition of Ruschism is formulated as an ideology supporting aggressive actions of modern Russia against the Euro-Atlantic community. Stages of the hybrid war Russia is leading against Ukraine are described, including the elements of subversive activity of the special services, the activation of the military phase and the gradual shift of the focus of confrontation to the realm of information and communication technologies. We reveal an emergence of a threat for democratic states resulting from the destabilizing impact of a target state’s mass media and social networks being exploited by Russian secret services under freedom-of-speech disguise. Thus, we underline the vulnerability of cyber- and information security of the network society in regard of hybrid war. We propose to define the latter a synergetic war. Our analysis is supported with a long-term qualitative monitoring of representation of top state officials on popular TV channels and Facebook. From the memetics point of view, we have detected a destructive psycho-information technology used by the Kremlin, a kind of information catastrophe, the essence of which is explained in detail. In the conclusion, a comprehensive plan for information protection of the public consciousness and mentality of Euro-Atlantic citizens from the aggression of the enemy is proposed.

Keywords: cyber and information security, hybrid war, psycho-information technology, synergetic war, Ruschism

Procedia PDF Downloads 116
1179 Technology Impact in Learning and Teaching English Language Writing

Authors: Laura Naka

Abstract:

The invention of computer writing programs has changed the way of teaching second language writing. This artificial intelligence engine can provide students with feedback on their essays, on their grammatical and spelling errors, convenient writing and editing tools to facilitate student’s writing process. However, it is not yet proved if this technology is helping students to improve their writing skills. There are several programs that are of great assistance for students concerning their writing skills. New technology provides students with different software programs which enable them to be more creative, to express their opinions and ideas in words, pictures and sounds, but at the end main and most correct feedback should be given by their teachers. No matter how new technology affects in writing skills, always comes from their teachers. This research will try to present some of the advantages and disadvantages that new technology has in writing process for students. The research takes place in the University of Gjakova ‘’Fehmi Agani’’ Faculty of Education-Preschool Program. The research aims to provide random sample response by using questionnaires and observation.

Keywords: English language learning, technology, academic writing, teaching L2.

Procedia PDF Downloads 550
1178 The Significance of ‘Practice’ in Art Research: Indian and Western Perspective

Authors: Mukta Avachat-Shirke

Abstract:

The process of manifestation in art has been studied deeply by various Indian and Western philosophers through times. In the art of painting, ‘Practice’ is always considered as techniques or making and ‘Theory’ is related to intelligence or the ‘conceptual.' The question about the significance of ‘Practice’ in artistic research has been a topic of debate. The aim of this qualitative study is to find the relevance of practice and theory while creating artworks. This study analyzes the thoughts and philosophy of Abhinavgupta, Hegel, and Croce to find a new perspective for looking at practice and theory within artistic research. With the method of grounded theory, the study attempts to establish the importance of both in artistic research. It discusses the issues like stages of creating art, role of tacit knowledge and importance of the decision-making the ability of the artist. This comparative analysis of these three philosophers along with the present systems can be used as a point of reference for further developments in the pedagogy of art research and artists, to understand the psychology and to follow the process of creativity effectively.

Keywords: artistic research, Indian philosophy, practice, Western Philosophy

Procedia PDF Downloads 275
1177 Coral Lifeform Structure in Selected Marine Protected Areas in Southern Cebu, Philippines

Authors: Gloria G. Delan, Alfonso S. Piquero, Rachel Luz V. Rica, Christine M. Corrales

Abstract:

The selected marine protected areas (MPAs) of southern Cebu, Philippines were assessed after these have been established between the years 2000 to 2007. These include Casay of Argao, Cawayan of Dalaguete, Guiwang-Daang Lungsod of Alcoy, North Granada of Boljoon and Sta. Cruz of Ronda. These MPAs were assessed to gather baseline information on its coral life-form structure. Point-intercept transect (PIT) method was used in the observation. Benthic life form and reef substrate at each 0.25 m point interval were identified and recorded along 50 meters transect line both inside and outside of these MPAs. It has been observed that massive, branching and digitate form of corals dominated among the five sanctuaries. Percentage of Live Hard Corals was much higher inside than outside in all sanctuaries. Common to all sanctuaries were noticeable presence of dead corals with algae and coral rubbles indicating an over-exploited habitat. Casay, Cawayan and Daan-Lungsod MPAs had some Crown of Thorn Starfish (COTS) which may pose threat to its coral community. It has been recommended that there should be strict law enforcement and a long term monitoring to continuously conserve and protect coral reef which is an important habitat for fishes for its sustainability as food for human.

Keywords: coral rubbles, coral reef, live hard coral, point-intercept transect

Procedia PDF Downloads 403
1176 Investigating the Socio-ecological Impacts of Sea Level Rise on Coastal Rural Communities in Ghana

Authors: Benjamin Ankomah-Asare, Richard Adade

Abstract:

Sea level rise (SLR) poses a significant threat to coastal communities globally. Ghana has over the years implemented protective measures such as the construction of groynes and revetment to serve as barriers to sea waves in major cities and towns to prevent sea erosion and flooding. For vulnerable rural coastal communities, the planned retreat is often proposed; however, relocation costs are often underestimated as losses of future social and cultural value are not always adequately taken into account. Through a mixed-methods approach combining qualitative interviews, surveys, and spatial analysis, the study examined the experiences of coastal rural communities in Ghana and assess the effectiveness of relocation strategies in addressing the socio-economic and environmental challenges posed by sea level rise. The study revealed the devastating consequences of sea level rise on these communities, including increased flooding, erosion, and saltwater intrusion into freshwater sources. Moreover, it highlights the adaptive capacities within these communities and how factors such as infrastructure, economic activities, cultural heritage, and governance structures shape their resilience in the face of environmental change. While relocation can be an effective strategy in reducing the risks associated with sea level rise, the study recommends that proper implementation of this adaptation strategy can be achieved when coupled with community-led planning, participatory decision-making, and targeted support for vulnerable groups.

Keywords: sea level rise, relocation, socio-ecological impacts, rural communities

Procedia PDF Downloads 26
1175 Removal of Gaseous Pollutant from the Flue Gas in a Submerged Self-Priming Venturi Scrubber

Authors: Manisha Bal, B. C. Meikap

Abstract:

Hydrogen chloride is the most common acid gas emitted by the industries. HCl gas is listed as Title III hazardous air pollutant. It causes severe threat to the human health as well as environment. So, removal of HCl from flue gases is very imperative. In the present study, submerged self-priming venturi scrubber is chosen to remove the HCl gas with water as a scrubbing liquid. Venturi scrubber is the most popular device for the removal of gaseous pollutants. Main mechanism behind the venturi scrubber is the polluted gas stream enters at converging section which accelerated to maximum velocity at throat section. A very interesting thing in case of submerged condition, venturi scrubber is submerged inside the liquid tank and liquid is entered at throat section because of suction created due to large pressure drop generated at the throat section. Maximized throat gas velocity atomizes the entered liquid into number of tiny droplets. Gaseous pollutant HCl is absorbed from gas to liquid droplets inside the venturi scrubber due to interaction between the gas and water. Experiments were conducted at different throat gas velocity, water level and inlet concentration of HCl to enhance the HCl removal efficiency. The effect of throat gas velocity, inlet concentration of HCl, and water level on removal efficiency of venturi scrubber has been evaluated. Present system yielded very high removal efficiency for the scrubbing of HCl gas which is more than 90%. It is also concluded that the removal efficiency of HCl increases with increasing throat gas velocity, inlet HCl concentration, and water level height.

Keywords: air pollution, HCl scrubbing, mass transfer, self-priming venturi scrubber

Procedia PDF Downloads 125
1174 Securitizing Terrorism: A Critical Appraisal of Pakistan’s Counter-Terrorism Approach

Authors: Bilal Zubair

Abstract:

In a constantly challenging internal security environment, Pakistan is making ways to improvise and respond to the new variations in the pervasive phenomenon of terrorism. The state’s endeavors towards securitizing terrorism as an existential threat are both extensive and intensive which have systematically incorporated both military and non-military means. Since 2007, the military has been conducting intermittent operations and by 2014 has successfully neutralized the terrorist ability to target vital security installations and security personal. The terrorists have responded by targeting communities which are soft targets and extremely vulnerable to organized assaults. Within this context, the study aims to explain the emerging trends of terrorism in Pakistan, which multi-layered and complex developments are having far-reaching implications for state and society. With a view to explore the underlining reasons, present trends and ensuing ramifications of the emerging trends in terrorism, this study would examine the following: First, the historical processes and development of Terrorism in Pakistan; secondly the processes of securitization which include political consensus, legal frameworks and military operations against the terrorist groups; thirdly , the socio-cultural dimensions and geopolitical influences on the transforming nature of sectarian terrorism. The study will also highlight the grey areas and weak links in the ongoing securitization process. Finally, the study will thoroughly explore the societal insecurity which is manifested in internal displacements, identity crisis and weakening the socio-political fabric of the state.

Keywords: counter-terrorism, terrorism, sectarianism, securitizing

Procedia PDF Downloads 277
1173 Enhanced Model for Risk-Based Assessment of Employee Security with Bring Your Own Device Using Cyber Hygiene

Authors: Saidu I. R., Shittu S. S.

Abstract:

As the trend of personal devices accessing corporate data continues to rise through Bring Your Own Device (BYOD) practices, organizations recognize the potential cost reduction and productivity gains. However, the associated security risks pose a significant threat to these benefits. Often, organizations adopt BYOD environments without fully considering the vulnerabilities introduced by human factors in this context. This study presents an enhanced assessment model that evaluates the security posture of employees in BYOD environments using cyber hygiene principles. The framework assesses users' adherence to best practices and guidelines for maintaining a secure computing environment, employing scales and the Euclidean distance formula. By utilizing this algorithm, the study measures the distance between users' security practices and the organization's optimal security policies. To facilitate user evaluation, a simple and intuitive interface for automated assessment is developed. To validate the effectiveness of the proposed framework, design science research methods are employed, and empirical assessments are conducted using five artifacts to analyze user suitability in BYOD environments. By addressing the human factor vulnerabilities through the assessment of cyber hygiene practices, this study aims to enhance the overall security of BYOD environments and enable organizations to leverage the advantages of this evolving trend while mitigating potential risks.

Keywords: security, BYOD, vulnerability, risk, cyber hygiene

Procedia PDF Downloads 55
1172 Printed Thai Character Recognition Using Particle Swarm Optimization Algorithm

Authors: Phawin Sangsuvan, Chutimet Srinilta

Abstract:

This Paper presents the applications of Particle Swarm Optimization (PSO) Method for Thai optical character recognition (OCR). OCR consists of the pre-processing, character recognition and post-processing. Before enter into recognition process. The Character must be “Prepped” by pre-processing process. The PSO is an optimization method that belongs to the swarm intelligence family based on the imitation of social behavior patterns of animals. Route of each particle is determined by an individual data among neighborhood particles. The interaction of the particles with neighbors is the advantage of Particle Swarm to determine the best solution. So PSO is interested by a lot of researchers in many difficult problems including character recognition. As the previous this research used a Projection Histogram to extract printed digits features and defined the simple Fitness Function for PSO. The results reveal that PSO gives 67.73% for testing dataset. So in the future there can be explored enhancement the better performance of PSO with improve the Fitness Function.

Keywords: character recognition, histogram projection, particle swarm optimization, pattern recognition techniques

Procedia PDF Downloads 454
1171 A Deep Learning Approach to Online Social Network Account Compromisation

Authors: Edward K. Boahen, Brunel E. Bouya-Moko, Changda Wang

Abstract:

The major threat to online social network (OSN) users is account compromisation. Spammers now spread malicious messages by exploiting the trust relationship established between account owners and their friends. The challenge in detecting a compromised account by service providers is validating the trusted relationship established between the account owners, their friends, and the spammers. Another challenge is the increase in required human interaction with the feature selection. Research available on supervised learning (machine learning) has limitations with the feature selection and accounts that cannot be profiled, like application programming interface (API). Therefore, this paper discusses the various behaviours of the OSN users and the current approaches in detecting a compromised OSN account, emphasizing its limitations and challenges. We propose a deep learning approach that addresses and resolve the constraints faced by the previous schemes. We detailed our proposed optimized nonsymmetric deep auto-encoder (OPT_NDAE) for unsupervised feature learning, which reduces the required human interaction levels in the selection and extraction of features. We evaluated our proposed classifier using the NSL-KDD and KDDCUP'99 datasets in a graphical user interface enabled Weka application. The results obtained indicate that our proposed approach outperformed most of the traditional schemes in OSN compromised account detection with an accuracy rate of 99.86%.

Keywords: computer security, network security, online social network, account compromisation

Procedia PDF Downloads 99