Search results for: security mechanism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5641

Search results for: security mechanism

4291 A Real-World Roadmap and Exploration of Quantum Computers Capacity to Trivialise Internet Security

Authors: James Andrew Fitzjohn

Abstract:

This paper intends to discuss and explore the practical aspects of cracking encrypted messages with quantum computers. The theory of this process has been shown and well described both in academic papers and headline-grabbing news articles, but with all theory and hyperbole, we must be careful to assess the practicalities of these claims. Therefore, we will use real-world devices and proof of concept code to prove or disprove the notion that quantum computers will render the encryption technologies used by many websites unfit for purpose. It is time to discuss and implement the practical aspects of the process as many advances in quantum computing hardware/software have recently been made. This paper will set expectations regarding the useful lifespan of RSA and cipher lengths and propose alternative encryption technologies. We will set out comprehensive roadmaps describing when and how encryption schemes can be used, including when they can no longer be trusted. The cost will also be factored into our investigation; for example, it would make little financial sense to spend millions of dollars on a quantum computer to factor a private key in seconds when a commodity GPU could perform the same task in hours. It is hoped that the real-world results depicted in this paper will help influence the owners of websites who can take appropriate actions to improve the security of their provisions.

Keywords: quantum computing, encryption, RSA, roadmap, real world

Procedia PDF Downloads 112
4290 An Approach of Computer Modalities for Exploration of Hieroglyphics Substantial in an Investigation

Authors: Aditi Chauhan, Neethu S. Mohan

Abstract:

In the modern era, the advancement and digitalization in technology have taken place during an investigation of crime scene. The rapid enhancement and investigative techniques have changed the mean of identification of suspect. Identification of the person is one of the significant aspects, and personal authentication is the key of security and reliability in society. Since early 90 s, people have relied on comparing handwriting through its class and individual characteristics. But in today’s 21st century we need more reliable means to identify individual through handwriting. An approach employing computer modalities have lately proved itself auspicious enough in exploration of hieroglyphics substantial in investigating the case. Various software’s such as FISH, WRITEON, and PIKASO, CEDAR-FOX SYSTEM identify and verify the associated quantitative measure of the similarity between two samples. The research till date has been confined to identify the authorship of the concerned samples. But prospects associated with the use of computational modalities might help to identify disguised writing, forged handwriting or say altered or modified writing. Considering the applications of such modal, similar work is sure to attract plethora of research in immediate future. It has a promising role in national security too. Documents exchanged among terrorist can also be brought under the radar of surveillance, bringing forth their source of existence.

Keywords: documents, identity, computational system, suspect

Procedia PDF Downloads 162
4289 Standard Resource Parameter Based Trust Model in Cloud Computing

Authors: Shyamlal Kumawat

Abstract:

Cloud computing is shifting the approach IT capital are utilized. Cloud computing dynamically delivers convenient, on-demand access to shared pools of software resources, platform and hardware as a service through internet. The cloud computing model—made promising by sophisticated automation, provisioning and virtualization technologies. Users want the ability to access these services including infrastructure resources, how and when they choose. To accommodate this shift in the consumption model technology has to deal with the security, compatibility and trust issues associated with delivering that convenience to application business owners, developers and users. Absent of these issues, trust has attracted extensive attention in Cloud computing as a solution to enhance the security. This paper proposes a trusted computing technology through Standard Resource parameter Based Trust Model in Cloud Computing to select the appropriate cloud service providers. The direct trust of cloud entities is computed on basis of the interaction evidences in past and sustained on its present performances. Various SLA parameters between consumer and provider are considered in trust computation and compliance process. The simulations are performed using CloudSim framework and experimental results show that the proposed model is effective and extensible.

Keywords: cloud, Iaas, Saas, Paas

Procedia PDF Downloads 318
4288 Feasibility on Introducing an Alternative Solar Powered Propelling Mechanism for Multiday Fishing Boats in Sri Lanka

Authors: Oshada Gamage, Chamal Wimalasooriya, Chrismal Boteju, W. K. Wimalsiri

Abstract:

This paper presents a study on the feasibility of introducing a solar powered propelling mechanism to multi-day fishing boats as an alternative energy source. Since solar energy is readily available on the sea throughout the year, this free energy could be utilized to power multi-day fishing vessels. Multi-day boats have a large deck area where solar panels can be mounted above without much effort. This project involves studying the amount of power that can be generated using onboard solar panels and implementing an independent propelling system to run the boat. A chain drive system was designed to propel the boat, when the batteries are fully charged, from an electric motor using the same propeller. A 60 feet multi-day fishing boat built by a local boat manufacturer was chosen for the study. The service speed of the boat was around 6 knots with the electric motor, and the duration of cruising is 1 hour per day with around 11 hours of charging. 350-watt Mono-crystalline PV module, 75 kW HVH type motor, and 10 kWh lithium-ion battery packs were chosen for the study. From the calculations, it was obtained that the boat has 30 PV modules (10.5 kW), 5 batteries (47 kWh), The boat dimensions are 20 meter length of water line, 5.51 meter of beam, 1.8 meter of draught, and 77 ton of total displacement with the PV system net present value of USD 12445 for 20 years of operation and a payback period of around 8.2 years.

Keywords: multiday fishing boats, photovoltaic cells, solar energy, solar powered boat

Procedia PDF Downloads 135
4287 The Promoting of Early Childhood Development in Local Government Child Center

Authors: Vorapoj Promasatayaprot, Sumattana Glangkarn

Abstract:

Background: Early childhood, the first five years of life, is a time of rapid cognitive, linguistic, social, emotional and motor development. This study was descriptive research which the main purpose of this research was to study early childhood development in Child Center of Local Government in order to emphasize the public citizen and communities participate in the Child Development Center. Method: The study designed was Action Research and divided into four steps consisted of (1) Planning (2) Acting (3) Observing and (4) Reflecting. This study was employed the areas and the subjects consisted of 10 committees of the Child Center in Thakhonyang municipality, Kantharawichai District, Maha Sarakham Province, Thailand and 50 representative parents by using the purposive sampling technique. The instrument used in this study were questionnaires. The data were analyzed using descriptive statistic; percentage, mean, standard deviation, maximum value, minimum, median. Qualitative data was collected using the observation and interview and was analysed by content analysis. Results: The results of this research were as follows: The promoting of early childhood development in child center at Thakhonyang Municipality, Kantharawichai District, Maha Sarakham Province, Thailand were 6 procedures ; (1) workshop participation (2) workshop in action plan (3) performing in action plan (4) following supervision (5) self – assessment (6) knowledge sharing seminar. The service model of the Local Fund Health Security in Thailand was passed the qualifications of local fund health security by 6 procedures to be the high potential local fund health security. Conclusion: The key success is that the commission will have to respond the performance at all process of plan to address the issue in the future. Factor of success is to community participate with transparent procedure. Coordination committee should manipulate the child center benefits among stake holders.

Keywords: child center, develop, early childhood development, local government, promote

Procedia PDF Downloads 169
4286 Self-Organizing Maps for Exploration of Partially Observed Data and Imputation of Missing Values in the Context of the Manufacture of Aircraft Engines

Authors: Sara Rejeb, Catherine Duveau, Tabea Rebafka

Abstract:

To monitor the production process of turbofan aircraft engines, multiple measurements of various geometrical parameters are systematically recorded on manufactured parts. Engine parts are subject to extremely high standards as they can impact the performance of the engine. Therefore, it is essential to analyze these databases to better understand the influence of the different parameters on the engine's performance. Self-organizing maps are unsupervised neural networks which achieve two tasks simultaneously: they visualize high-dimensional data by projection onto a 2-dimensional map and provide clustering of the data. This technique has become very popular for data exploration since it provides easily interpretable results and a meaningful global view of the data. As such, self-organizing maps are usually applied to aircraft engine condition monitoring. As databases in this field are huge and complex, they naturally contain multiple missing entries for various reasons. The classical Kohonen algorithm to compute self-organizing maps is conceived for complete data only. A naive approach to deal with partially observed data consists in deleting items or variables with missing entries. However, this requires a sufficient number of complete individuals to be fairly representative of the population; otherwise, deletion leads to a considerable loss of information. Moreover, deletion can also induce bias in the analysis results. Alternatively, one can first apply a common imputation method to create a complete dataset and then apply the Kohonen algorithm. However, the choice of the imputation method may have a strong impact on the resulting self-organizing map. Our approach is to address simultaneously the two problems of computing a self-organizing map and imputing missing values, as these tasks are not independent. In this work, we propose an extension of self-organizing maps for partially observed data, referred to as missSOM. First, we introduce a criterion to be optimized, that aims at defining simultaneously the best self-organizing map and the best imputations for the missing entries. As such, missSOM is also an imputation method for missing values. To minimize the criterion, we propose an iterative algorithm that alternates the learning of a self-organizing map and the imputation of missing values. Moreover, we develop an accelerated version of the algorithm by entwining the iterations of the Kohonen algorithm with the updates of the imputed values. This method is efficiently implemented in R and will soon be released on CRAN. Compared to the standard Kohonen algorithm, it does not come with any additional cost in terms of computing time. Numerical experiments illustrate that missSOM performs well in terms of both clustering and imputation compared to the state of the art. In particular, it turns out that missSOM is robust to the missingness mechanism, which is in contrast to many imputation methods that are appropriate for only a single mechanism. This is an important property of missSOM as, in practice, the missingness mechanism is often unknown. An application to measurements on one type of part is also provided and shows the practical interest of missSOM.

Keywords: imputation method of missing data, partially observed data, robustness to missingness mechanism, self-organizing maps

Procedia PDF Downloads 135
4285 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System

Authors: Farheen Tabassum, Shoab Ahmed Khan

Abstract:

The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.

Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS

Procedia PDF Downloads 341
4284 Conserved Stem-Loop Structure at the End of Short Interspersed Nuclear Elements (SINE) and Long Interspersed Nuclear Elements (LINE) Pairs of Different Species

Authors: Daria Grechishnikova, Maria Poptsova

Abstract:

Transposable elements play an important role in the evolution of various species from bacteria to human. Long Interspersed Nuclear Elements (LINEs) and Short Interspersed Nuclear Elements (SINEs) are two major classes of retrotransposons that occupy a considerable part of any genome and their copy numbers can range form several hundreds to a million. Both LINEs and SINEs multiply through a copy-and-paste mechanism. LINEs encode proteins, which make them capable of self-propagation while SINEs are parasitic and require the machinery of LINEs to multiply. The mechanisms how LINE and SINE RNA is recognized by the LINE-encoded reverse transcriptase (RT) remain unclear. For some SINE-LINE pairs, it was shown that they share a common 3’-end with a stem-loop structure. Majority of the SINE-LINE pairs do not have a common 3’-end. Recently we have shown that in the human genome Alu-L1 pairs have structurally similar stem-loop structure at the 3’-end. Here we extended our analysis to a wide range of species and analyzed LINEs from 161 different species from Repbase and 217 SINE sequences from SINEBase. It appeared that all of the analyzed sequences contained stem-loop structures at the 3’-end. Here we conclude that it is very likely that a common evolutionary mechanism of transposon RNA recognition requires the presence of stem-loop structures at their 3’-end.

Keywords: LINE, SINE, mechanisms of retrotransposition, retrotransposons, stem-loop, stem-loop structures, transposons

Procedia PDF Downloads 337
4283 Self-Action of Pyroelectric Spatial Soliton in Undoped Lithium Niobate Samples with Pyroelectric Mechanism of Nonlinear Response

Authors: Anton S. Perin, Vladimir M. Shandarov

Abstract:

Compensation for the nonlinear diffraction of narrow laser beams with wavelength of 532 and the formation of photonic waveguides and waveguide circuits due to the contribution of pyroelectric effect to the nonlinear response of lithium niobate crystal have been experimentally demonstrated. Complete compensation for the linear and nonlinear diffraction broadening of light beams is obtained upon uniform heating of an undoped sample from room temperature to 55 degrees Celsius. An analysis of the light-field distribution patterns and the corresponding intensity distribution profiles allowed us to estimate the spacing for the channel waveguides. The observed behavior of bright soliton beams may be caused by their coherent interaction, which manifests itself in repulsion for anti-phase light fields and in attraction for in-phase light fields. The experimental results of this study showed a fundamental possibility of forming optically complex waveguide structures in lithium niobate crystals with pyroelectric mechanism of nonlinear response. The topology of these structures is determined by the light field distribution on the input face of crystalline sample. The optical induction of channel waveguide elements by interacting spatial solitons makes it possible to design optical systems with a more complex topology and a possibility of their dynamic reconfiguration.

Keywords: self-action, soliton, lithium niobate, piroliton, photorefractive effect, pyroelectric effect

Procedia PDF Downloads 149
4282 Development of an Auxetic Tissue Implant

Authors: Sukhwinder K. Bhullar, M. B. G. Jun

Abstract:

The developments in biomedical industry have demanded the development of biocompatible, high performance materials to meet higher engineering specifications. The general requirements of such materials are to provide a combination of high stiffness and strength with significant weight savings, resistance to corrosion, chemical resistance, low maintenance, and reduced costs. Auxetic materials which come under the category of smart materials offer huge potential through measured enhancements in mechanical properties. Unique deformation mechanism, providing cushioning on indentation, automatically adjustable with its strength and thickness in response to forces and having memory returns to its neutral state on dissipation of stresses make them good candidate in biomedical industry. As simple extension and compression of tissues is of fundamental importance in biomechanics, therefore, to study the elastic behaviour of auxetic soft tissues implant is targeted in this paper. Therefore development and characterization of auxetic soft tissue implant is studied in this paper. This represents a real life configuration where soft tissue such as meniscus in knee replacement, ligaments and tendons often are taken as transversely isotropic. Further, as composition of alternating polydisperse blocks of soft and stiff segments combined with excellent biocompatibility make polyurethanes one of the most promising synthetic biomaterials. Hence selecting auxetic polyurathylene foam functional characterization is performed and compared with conventional polyurathylene foam.

Keywords: auxetic materials, deformation mechanism, enhanced mechanical properties, soft tissues

Procedia PDF Downloads 450
4281 Growing Acts of Terrorism in Local Conflicts: A Dire Need for International Attention

Authors: Yusuf Abubakar Mamud

Abstract:

Highlighting the imperatives of local conflicts considering the dangerous dimensions of terrorism they are assuming in Africa has not attracted serious academic and political attention. The discourse about conflict in Africa was discussed within five identified conflict zones in the continent. The threats from these local conflicts are diverse and complex and the acts of terrorism in these local conflicts are driven by certain attitudes and behaviours linked to the African leadership. The paper examined and noted that the current conflict resolution model of the African Union (AU) was robust with requisite institutions to address the trends in local conflicts. However, it was observed that the AU peace and security framework lacked the requisite structural and technical capabilities to proactively address the drivers of local conflicts in Africa. It was found that the persistence of local conflicts in the African region may deny her the opportunities of achievement of the targets envisioned in the Sustainable Development Goals (SDGs). Consequently, the paper called on the international community to support Africa through provision of capacity. It urged the African leaders themselves to develop the political will to ensure that all issues concerning peace and security in the continent were guided by the provisions of the AU Constitutive Act. The need to strengthen the APRM in the light of the current trends in local conflicts was also highlighted.

Keywords: conflicts, local conflicts, terrorism, sustainable development

Procedia PDF Downloads 261
4280 BFDD-S: Big Data Framework to Detect and Mitigate DDoS Attack in SDN Network

Authors: Amirreza Fazely Hamedani, Muzzamil Aziz, Philipp Wieder, Ramin Yahyapour

Abstract:

Software-defined networking in recent years came into the sight of so many network designers as a successor to the traditional networking. Unlike traditional networks where control and data planes engage together within a single device in the network infrastructure such as switches and routers, the two planes are kept separated in software-defined networks (SDNs). All critical decisions about packet routing are made on the network controller, and the data level devices forward the packets based on these decisions. This type of network is vulnerable to DDoS attacks, degrading the overall functioning and performance of the network by continuously injecting the fake flows into it. This increases substantial burden on the controller side, and the result ultimately leads to the inaccessibility of the controller and the lack of network service to the legitimate users. Thus, the protection of this novel network architecture against denial of service attacks is essential. In the world of cybersecurity, attacks and new threats emerge every day. It is essential to have tools capable of managing and analyzing all this new information to detect possible attacks in real-time. These tools should provide a comprehensive solution to automatically detect, predict and prevent abnormalities in the network. Big data encompasses a wide range of studies, but it mainly refers to the massive amounts of structured and unstructured data that organizations deal with on a regular basis. On the other hand, it regards not only the volume of the data; but also that how data-driven information can be used to enhance decision-making processes, security, and the overall efficiency of a business. This paper presents an intelligent big data framework as a solution to handle illegitimate traffic burden on the SDN network created by the numerous DDoS attacks. The framework entails an efficient defence and monitoring mechanism against DDoS attacks by employing the state of the art machine learning techniques.

Keywords: apache spark, apache kafka, big data, DDoS attack, machine learning, SDN network

Procedia PDF Downloads 156
4279 Gratitude, Forgiveness and Relationship Satisfaction in Dating College Students: A Parallel Multiple Mediator Model

Authors: Qinglu Wu, Anna Wai-Man Choi, Peilian Chi

Abstract:

Gratitude is one individual strength that not only facilitates the mental health, but also fosters the relationship satisfaction in the romantic relationship. In terms of moral effect theory and stress-and-coping theory of forgiveness, present study not only investigated the association between grateful disposition and relationship satisfaction, but also explored the mechanism by comprehensively examining the potential mediating roles of three profiles of forgiveness (trait forgivingness, decisional forgiveness, emotional forgiveness), another character strength that highly related to the gratitude and relationship satisfaction. Structural equation modeling was used to conduct the multiple mediator model with a sample of 103 Chinese college students in dating relationship (39 male students and 64 female students, Mage = 19.41, SD = 1.34). Findings displayed that both gratitude and relationship satisfaction positively correlated with decisional forgiveness and emotional forgiveness. Emotional forgiveness was the only mediator, and it completely mediated the relationship between gratitude and relationship satisfaction. Gratitude was helpful in enhancing individuals’ perception of satisfaction in romantic relationship through replacing negative emotions toward partners with positive ones after transgression in daily life. It highlighted the function of emotional forgiveness in personal healing and peaceful state, which is important to the perception of satisfaction in relationship. Findings not only suggested gratitude could provide a stability for forgiveness, but also the mechanism of prosocial responses or positive psychological processes on relationship satisfaction. The significant roles of gratitude and emotional forgiveness could be emphasized in the intervention working on the romantic relationship development or reconciliation.

Keywords: decisional forgiveness, emotional forgiveness, gratitude, relationship satisfaction, trait forgivingness

Procedia PDF Downloads 256
4278 Moving Target Defense against Various Attack Models in Time Sensitive Networks

Authors: Johannes Günther

Abstract:

Time Sensitive Networking (TSN), standardized in the IEEE 802.1 standard, has been lent increasing attention in the context of mission critical systems. Such mission critical systems, e.g., in the automotive domain, aviation, industrial, and smart factory domain, are responsible for coordinating complex functionalities in real time. In many of these contexts, a reliable data exchange fulfilling hard time constraints and quality of service (QoS) conditions is of critical importance. TSN standards are able to provide guarantees for deterministic communication behaviour, which is in contrast to common best-effort approaches. Therefore, the superior QoS guarantees of TSN may aid in the development of new technologies, which rely on low latencies and specific bandwidth demands being fulfilled. TSN extends existing Ethernet protocols with numerous standards, providing means for synchronization, management, and overall real-time focussed capabilities. These additional QoS guarantees, as well as management mechanisms, lead to an increased attack surface for potential malicious attackers. As TSN guarantees certain deadlines for priority traffic, an attacker may degrade the QoS by delaying a packet beyond its deadline or even execute a denial of service (DoS) attack if the delays lead to packets being dropped. However, thus far, security concerns have not played a major role in the design of such standards. Thus, while TSN does provide valuable additional characteristics to existing common Ethernet protocols, it leads to new attack vectors on networks and allows for a range of potential attacks. One answer to these security risks is to deploy defense mechanisms according to a moving target defense (MTD) strategy. The core idea relies on the reduction of the attackers' knowledge about the network. Typically, mission-critical systems suffer from an asymmetric disadvantage. DoS or QoS-degradation attacks may be preceded by long periods of reconnaissance, during which the attacker may learn about the network topology, its characteristics, traffic patterns, priorities, bandwidth demands, periodic characteristics on links and switches, and so on. Here, we implemented and tested several MTD-like defense strategies against different attacker models of varying capabilities and budgets, as well as collaborative attacks of multiple attackers within a network, all within the context of TSN networks. We modelled the networks and tested our defense strategies on an OMNET++ testbench, with networks of different sizes and topologies, ranging from a couple dozen hosts and switches to significantly larger set-ups.

Keywords: network security, time sensitive networking, moving target defense, cyber security

Procedia PDF Downloads 58
4277 Hierarchical Filtering Method of Threat Alerts Based on Correlation Analysis

Authors: Xudong He, Jian Wang, Jiqiang Liu, Lei Han, Yang Yu, Shaohua Lv

Abstract:

Nowadays, the threats of the internet are enormous and increasing; however, the classification of huge alert messages generated in this environment is relatively monotonous. It affects the accuracy of the network situation assessment, and also brings inconvenience to the security managers to deal with the emergency. In order to deal with potential network threats effectively and provide more effective data to improve the network situation awareness. It is essential to build a hierarchical filtering method to prevent the threats. In this paper, it establishes a model for data monitoring, which can filter systematically from the original data to get the grade of threats and be stored for using again. Firstly, it filters the vulnerable resources, open ports of host devices and services. Then use the entropy theory to calculate the performance changes of the host devices at the time of the threat occurring and filter again. At last, sort the changes of the performance value at the time of threat occurring. Use the alerts and performance data collected in the real network environment to evaluate and analyze. The comparative experimental analysis shows that the threat filtering method can effectively filter the threat alerts effectively.

Keywords: correlation analysis, hierarchical filtering, multisource data, network security

Procedia PDF Downloads 186
4276 Effects of New Anthraquinone Derivatives on Resistance Ovarian Cancer Cells and The Mechanism Investigation

Authors: Hui-Hsin Huang, Sheng-Tung Huang, Chi-Ming Lee, Chiao-Han Yen, Chun-Mao Lin

Abstract:

At initiation stage, there are no symptoms at initiation stage; however, at late stage, patients suffer symptoms as soon as ovarian cancer metastasis. Moreover, ovarian cancer cells are resistant to some anti-ovarian cancer drugs in clinical. Thus, it is very important to find an effective treatment for resistant ovarian cancer. Anthraquinone derivatives are able to induce DNA damage and lead to cell apoptosis, so several derivatives have been used for clinical application. Therefore, to explore more effective anti-ovarian cancer drugs, this study investigates the mechanism of three new anthraquinone compounds bearing different functional groups to camptothecin-resistance ovarian cell line A2780R2000. Cell viability was determined by MTT assay after treating A2780R2000 with the three new anthraquinone compounds. The results indicated that IC50 values are 33.44μM (Compound I), 25.77μM (Compound II) and 24.59μM (Compound III). Next, through cell cycle analysis, the results demonstrated that three new anthraquinone compounds not only induced A2780R2000 cell cycle arrest at early stage but also apoptosis at late stage. Besides, through apoptosis assay, the results indicated new anthraquinone compound induced apoptosis at late stage. Furthermore, the results of western blot show that the three new anthraquinone compounds lead to A2780R2000 apoptosis through intrinsic pathway. Theses results suggested that three new anthraquinone compounds may be potential new drugs for clinical cancer treatment in the future.

Keywords: anthraquinone, camptothecin, resistance, ovarian cancer

Procedia PDF Downloads 377
4275 The Impact of Illegal Firearms Possession, Limited Security Staff and Porosity of Border on Human Security in Ipokia Local Government Area, Ogun State

Authors: Ogunmefun Folorunsho Muyideen, Aluko Tolulope Evelyn

Abstract:

One of the trending menaces faced in the world today is centered on the porosity of borders and proliferation of illegal weapons among the state members without the state authorizations. The proliferation of weapons along porous borders remains a germane and unsolvable question among developed and developing nations due to crisis degenerated from the menace (loss of lives, properties, traumatization, civil unrest and retrogressive economic development). A mixed method was adopted while the survey method was used for communities’ selection (Oke-Odan, Ajilete, Illaise, Lanlate) at Ipokia Local Government as a sample frame. Multi-stage sampling was employed to break down the site into wards, streets, and different house numbers before randomizing administration of the questionnaires using face to face method, while purposive sampling was used for collecting verbal information through an in-depth interviews method. The population size for the site is 150.398, while 399 was the sample size derived from the use of Yamane sample size formula. After retrieval of structured questionnaires, 346 were found useful, while 10 percent (399) of the quantitative instruments was summed to 30 participants that were interviewed using the in-depth interviews technique. The result of the first hypothesis shows a composite relationship between the variables tested (independents and dependent). The result indicated that the porosity of the border, illegal possession of guns, and limited security staff jointly predispose insecurity among the residents of the selected study site. The result of the second hypothesis deciphers that the illegal gun possession (independent) variable predict business outcome among the residents of the study site because sporadic gun shoot will regress the business activities in the study area. The result of third result indicated that the independent (porosity of borders) variable predict social bonding network because a high level of insecurity will destroy the level of trust in the communication among the residents of the study area. The last questions give comprehensive meaning to one of the recommendations derived using content systematic analysis, which explains that out of 30 participants interviewed, 18 submitted individual involvement in monitoring communities will solve the problem, 7 out of 30 opines that governmental agents are to be trained for effective combat, 3 participants out 30 submits that the fight is for both government and the citizens while 2 participants out of 30 claimed that there must be an agreement between Nigerian and neighbouring countries on border security. International donors must totally control the sales of weapons to unauthorized personalities. Criminal cases must be treated with deterrence measures and target hardened procedures through decoying and blending, stakeout, and sting tactics.

Keywords: human security, illegal weapons, porous borders, development

Procedia PDF Downloads 156
4274 Sustainability through Resilience: How Emergency Responders Cope with Stressors

Authors: Sophie Kroeling, Agnetha Schuchardt

Abstract:

Striving for sustainability brings a lot of challenges for different fields of interest, e. g. security or health concerns. In Germany, civil protection is predominantly carried out by emergency responders who perform essential tasks of civil protection. Based on theoretical concepts of different psychological stress theories this contribution focuses on the question, how the resilience of emergency responders can be improved. The goal is to identify resources and successful coping strategies that help to prevent and reduce negative outcomes during or after stressful events. The paper will present results from a qualitative analysis of semi-structured qualitative interviews with 20 emergency responders. These results provide insights into the complexity of coping processes (e. g. controlling the situation, downplaying perceived personal threats through humor) and show the diversity of stressors (like complexity of the disastrous situation, intrusive press and media, or lack of social support within the organization). Self-efficacy expectation was a very important resource for coping with stressful situations. The results served as a starting point for a quantitative survey (that was conducted in March 2017), the development of education and training tools for emergency responders and the improvement of critical incident stress management processes. First results from the quantitative study with more than 700 participants show that, e. g., the emergency responders use social coping within their private social network and also within their aid organization and that both are correlated to resilience. Moreover, missing information, bureaucratic problems and social conflicts within the organization are events that the majority of the participants considered very onerous. Further results from regression analysis will be presented. The proposed paper will combine findings from the qualitative study with the quantitative results, illustrating figures and correlations with respective statements from the interviews. At the end, suggestions for the improvement of the emergency responder’s resilience are given and it is discussed how this can make a contribution to strive for civil security and furthermore a sustainable development.

Keywords: civil security, emergency responders, stress, resilience, resources

Procedia PDF Downloads 132
4273 An Overall Evaluation of Food Nanotechnology

Authors: Raana Babadi Fathipour

Abstract:

Nourishment nanotechnology is an range of rising intrigued and opens up a entirety universe of modern conceivable outcomes for the nourishment industry. The essential categories of nanotechnology applications and functionalities right now within the improvement of nourishment bundling incorporate: the enhancement of plastic materials obstructions, the consolidation of dynamic components that can convey utilitarian properties past those of customary dynamic bundling, and the detecting and signaling of significant data. Nano nourishment bundling materials may amplify nourishment life, move forward nourishment security, alarm buyers that nourishment is sullied or ruined, repair tears in bundling, and indeed release preservatives to expand the life of the nourishment within the bundle. Nanotechnology applications within the nourishment industry can be utilized to identify microbes in bundling, or produce stronger flavors and color quality, and security by expanding the obstruction properties. Nanotechnology holds extraordinary guarantee to supply benefits not fair inside nourishment items but too around nourishment items. In reality, nanotechnology presents modern chances for advancement within the nourishment industry at monstrous speed, but instability and wellbeing concerns are moreover developing. EU/WE/global enactment for the direction of nanotechnology in nourishment are scanty. Besides, current enactment shows up unacceptable to nanotechnology specificity.

Keywords: nano technology, nano foods, food packaging, nano participle

Procedia PDF Downloads 46
4272 Catalytic Hydrodesulfurization of Dibenzothiophene Coupled with Ionic Liquids over Low Pd Incorporated Co-Mo@Al₂O₃ and Ni-Mo@Al₂O₃ Catalysts at Mild Operating Conditions

Authors: Yaseen Muhammad, Zhenxia Zhao, Zhangfa Tong

Abstract:

A key problem with hydrodesulfurization (HDS) process of fuel oils is the application of severe operating conditions. In this study, we proposed the catalytic HDS of dibenzothiophene (DBT) integrated with ionic liquids (ILs) application at mild temperature and pressure over low loaded (0.5 wt.%) Pd promoted Co-Mo@Al₂O₃ and Ni-Mo@Al₂O₃ catalysts. Among the thirteen ILs tested, [BMIM]BF₄, [(CH₃)₄N]Cl, [EMIM]AlCl₄, and [(C₈H₁₇)(C₃H₇)₃P]Br enhanced the catalytic HDS efficiency while the latest ranked the top of activity list as confirmed by DFT studies as well. Experimental results revealed that Pd incorporation greatly enhanced the HDS activity of classical Co or Ni based catalysts. At mild optimized experimental conditions of 1 MPa H₂ pressure, 120 oC, IL:oil ratio of 1:3 and 4 h reaction time, the % DBT conversion (21 %) by Ni-Mo@Al₂O₃ was enhanced to 69 % (over Pd-Ni-Mo@ Al₂O₃) using [(C₈H₁₇) (C₃H₇)₃P]Br. The fresh and spent catalysts were characterized for textural properties using XPS, SEM, EDX, XRD and BET surface area techniques. An overall catalytic HDS activity followed the order of: Pd-Ni-Mo@Al₂O₃ > Pd-Co-Mo@Al₂O₃ > Ni-Mo@Al₂O₃ > Co-Mo@Al₂O₃. [(C₈H₁₇) (C₃H₇)₃P]Br.could be recycled four times with minimal decrease in HDS activity. Reaction products were analyzed by GC-MS which helped in proposing reaction mechanism for the IL coupled HDS process. The present approach attributed to its cost-effective nature, ease of operation with less mechanical requirements in terms of mild operating conditions, and high efficiency could be deemed as an alternative approach for the HDS of DBT on industrial level applications.

Keywords: DFT simulation, GC-MS and reaction mechanism, Ionic liquid coupled HDS of DBT, low Pd loaded catalyst, mild operating condition

Procedia PDF Downloads 132
4271 In silico Designing and Insight into Antimalarial Potential of Chalcone-Quinolinylpyrazole Hybrids by Preclinical Study in Mice

Authors: Deepika Saini, Sandeep Jain, Ajay Kumar

Abstract:

The quinoline scaffold is one of the most widely studied in the discovery of derivatives with various heterocyclic moieties due to its potential antimalarial activities. In the present study, a chalcone series of quinoline derivatives clubbed with pyrazole were synthesized to evaluate their antimalarial property by in vitro schizont maturation inhibition assay against both chloroquine sensitive, 3D7 and chloroquine resistant, RKL9 strain of Plasmodium falciparum. Further, top five compounds were studied for in vivo preclinical study for antimalarial potential against P. berghei in Swiss albino mice. To understand the mechanism of synthesized analogues, they were screened computationally by molecular docking techniques. Compounds were docked into the active site of a protein receptor, Plasmodium falciparum Cysteine Protease Falcipain-2. The compounds were successfully synthesized, and structural confirmation was performed by FTIR, 1H-NMR, mass spectrometry and elemental analysis. In vitro study suggested that the compounds 5b, 5g, 5l, 5s and 5u possessed best antimalarial activity and further tested for in vivo screening. Compound 5u (CH₃ on both rings) with EC₅₀ 0.313 & 0.801 µg/ml against CQ-S & CQ-R strains of P. falciparum respectively and 78.01% suppression of parasitemia. The molecular docking studies of the compounds helped in understanding the mechanism of action against falcipain-2. The present study reveals the binding signatures of the synthesized ligands within the active site of the protein, and it explains the results from in vitro study in their EC₅₀ values and percentage parasitemia.

Keywords: antimalarial activity, chalcone, docking, quinoline

Procedia PDF Downloads 393
4270 Data Security and Privacy Challenges in Cloud Computing

Authors: Amir Rashid

Abstract:

Cloud Computing frameworks empower organizations to cut expenses by outsourcing computation resources on-request. As of now, customers of Cloud service providers have no methods for confirming the privacy and ownership of their information and data. To address this issue we propose the platform of a trusted cloud computing program (TCCP). TCCP empowers Infrastructure as a Service (IaaS) suppliers, for example, Amazon EC2 to give a shout box execution condition that ensures secret execution of visitor virtual machines. Also, it permits clients to bear witness to the IaaS supplier and decide if the administration is secure before they dispatch their virtual machines. This paper proposes a Trusted Cloud Computing Platform (TCCP) for guaranteeing the privacy and trustworthiness of computed data that are outsourced to IaaS service providers. The TCCP gives the deliberation of a shut box execution condition for a client's VM, ensuring that no cloud supplier's authorized manager can examine or mess up with its data. Furthermore, before launching the VM, the TCCP permits a client to dependably and remotely acknowledge that the provider at backend is running a confided in TCCP. This capacity extends the verification of whole administration, and hence permits a client to confirm the data operation in secure mode.

Keywords: cloud security, IaaS, cloud data privacy and integrity, hybrid cloud

Procedia PDF Downloads 280
4269 Optimizing Microwave Assisted Extraction of Anti-Diabetic Plant Tinospora cordifolia Used in Ayush System for Estimation of Berberine Using Taguchi L-9 Orthogonal Design

Authors: Saurabh Satija, Munish Garg

Abstract:

Present work reports an efficient extraction method using microwaves based solvent–sample duo-heating mechanism, for the extraction of an important anti-diabetic plant Tinospora cordifolia from AYUSH system for estimation of berberine content. The process is based on simultaneous heating of sample matrix and extracting solvent under microwave energy. Methanol was used as the extracting solvent, which has excellent berberine solubilizing power and warms up under microwave attributable to its great dispersal factor. Extraction conditions like time of irradition, microwave power, solute-solvent ratio and temperature were optimized using Taguchi design and berberine was quantified using high performance thin layer chromatography. The ranked optimized parameters were microwave power (rank 1), irradiation time (rank 2) and temperature (rank 3). This kind of extraction mechanism under dual heating provided choice of extraction parameters for better precision and higher yield with significant reduction in extraction time under optimum extraction conditions. This developed extraction protocol will lead to extract higher amounts of berberine which is a major anti-diabetic moiety in Tinospora cordifolia which can lead to development of cheaper formulations of the plant Tinospora cordifolia and can help in rapid prevention of diabetes in the world.

Keywords: berberine, microwave, optimization, Taguchi

Procedia PDF Downloads 326
4268 An Immune-Inspired Web Defense Architecture

Authors: Islam Khalil, Amr El-Kadi

Abstract:

With the increased use of web technologies, microservices, and Application Programming Interface (API) for integration between systems, and with the development of containerization of services on the operating system level as a method of isolating system execution and for easing the deployment and scaling of systems, there is a growing need as well as opportunities for providing platforms that improve the security of such services. In our work, we propose an architecture for a containerization platform that utilizes various concepts derived from the human immune system. The goal of the proposed containerization platform is to introduce the concept of slowing down or throttling suspected malicious digital pathogens (intrusions) to reduce their damage footprint while providing more opportunities for forensic inspection of suspected pathogens in addition to the ability to snapshot, rollback, and recover from possible damage. The proposed platform also leverages existing intrusion detection algorithms by integrating and orchestrating their cooperative operation for more effective intrusion detection. We show how this model reduces the damage footprint of intrusions and gives a greater time window for forensic investigation. Moreover, during our experiments, our proposed platform was able to uncover unintentional system design flaws that resulted in internal DDoS-like attacks by submodules of the system itself rather than external intrusions.

Keywords: containers, human immunity, intrusion detection, security, web services

Procedia PDF Downloads 78
4267 As a Secure Bridge Country about Oil and Gas Sources Transfer after Arab Spring: Turkey

Authors: Fatih Ercin Guney, Hami Karagol

Abstract:

Day by day, humanity's energy needs increase, to facilitate access to energy sources by energy importing countries is of great importance in terms of issues both in terms of economic security and political security. The geographical location of the oil exporting countries in the Middle East (Iran, Iraq, Kuwait, Libya, Saudi Arabia, United Arab Emirates, Qatar) today, it is observed that evaluated by emerging Arab Spring(from Tunisia to Egypt) and freedom battles(in Syria) with security issues arise sourced from terrorist activities(ISIS). Progresses related with limited natural resources, energy and it's transportation issues which worries the developing countries, the energy in the region is considered to how to transfer safely. North Region of the Black Sea , the beginning of the conflict in the regional nature formed between Russia and Ukraine (2010), followed by the relevant regions of the power transmission line (From Russia to Europe) the discovery is considered to be the east's hand began to strengthen in terms of both the economical and political sides. With the growing need for safe access to the west of the new energy transmission lines are followed by Turkey, re-interest is considered to be shifted to the Mediterranean and the Middle East by West. Also, Russia, Iran and China (three axis of east) are generally performing as carry out parallel policies about energy , economical side and security in both United Nations Security Council (Two of Five Permanent Members are Russia and China) and Shanghai Cooperation Organization. In addition, Eastern Mediterranean Region Tension are rapidly increasing about research new oil and natural gas sources by Israel, Egypt, Cyprus, Lebanon. This paper provides, new energy corridor(s) are needed to transfer sources (Oil&Natural Gas) by Europe from East to West. So The West needs either safe bridge country to transfer natural sources to Europe in region or is needed to discovery new natural sources in extraterritorial waters of Eastern Mediterranean Region. But in two opportunities are evaluated with secure transfer corridors form region to Europe in safely. Even if the natural sources can be discovered, they are considered to transfer in safe manner. This paper involved, Turkey’s importance as a leader country in region over both of political and safe energy transfer sides as bridge country between south and north of Turkey why natural sources shall be transferred over Turkey, Even if diplomatic issues-For Example; Cyprus membership in European Union, Turkey membership candidate duration, Israel-Cyprus- Egypt-Lebanon researches about new natural sources in Mediterranean - occurred. But politic balance in Middle-East is changing quickly because of lack of democratic governments in region. So it is evaluated that the alliance of natural sources researches may not be long-time relations due to share sources after discoveries. After evaluating over causes and reasons, aim to reach finding foresight about future of region for energy transfer periods in secure manner.

Keywords: Middle East, natural gas, oil, Turkey

Procedia PDF Downloads 284
4266 Mechanism of pH Sensitive Flocculation for Organic Load and Colour Reduction in Landfill Leachate

Authors: Brayan Daniel Riascos Arteaga, Carlos Costa Perez

Abstract:

Landfill leachate has an important fraction of humic substances, mainly humic acids (HAs), which often represent more than half value of COD, specially in liquids proceeded from composting processes of organic fraction of solid wastes. We propose in this article a new method of pH sensitive flocculation for COD and colour reduction in landfill leachate based on the chemical properties of HAs. Landfill leachate with a high content of humic acids can be efficiently treated by pH sensitive flocculation at pH 2.0, reducing COD value in 86.1% and colour in 84.7%. Mechanism of pH sensitive flocculation is based in protonation first of phenolic groups and later of carboxylic acid groups in the HAs molecules, resulting in a reduction of Zeta potential value. For pH over neutrality, carboxylic acid and phenolic groups are ionized and Zeta potential increases in absolute value, maintaining HAs in suspension as colloids and conducting flocculation to be obstructed. Ionized anionic groups (carboxylates) can interact electrostatically with cations abundant in leachate (site binding) aiding to maintain HAs in suspension. Simulation of this situation and ideal visualization of Zeta potential behavior is described in the paper and aggregation of molecules by H-bonds is proposed as the main step in separation of HAs from leachate and reduction of COD value in this complex liquid. CHNS analysis, FT-IR spectrometry and UV–VIS spectrophotometry show chemical elements content in the range of natural and commercial HAs, clear aromaticity and carboxylic acids and phenolic groups presence in the precipitate from landfill leachate

Keywords: landfill leachate, humic acids, COD, chemical treatment, flocculation

Procedia PDF Downloads 59
4265 Enhancing Robustness in Federated Learning through Decentralized Oracle Consensus and Adaptive Evaluation

Authors: Peiming Li

Abstract:

This paper presents an innovative blockchain-based approach to enhance the reliability and efficiency of federated learning systems. By integrating a decentralized oracle consensus mechanism into the federated learning framework, we address key challenges of data and model integrity. Our approach utilizes a network of redundant oracles, functioning as independent validators within an epoch-based training system in the federated learning model. In federated learning, data is decentralized, residing on various participants' devices. This scenario often leads to concerns about data integrity and model quality. Our solution employs blockchain technology to establish a transparent and tamper-proof environment, ensuring secure data sharing and aggregation. The decentralized oracles, a concept borrowed from blockchain systems, act as unbiased validators. They assess the contributions of each participant using a Hidden Markov Model (HMM), which is crucial for evaluating the consistency of participant inputs and safeguarding against model poisoning and malicious activities. Our methodology's distinct feature is its epoch-based training. An epoch here refers to a specific training phase where data is updated and assessed for quality and relevance. The redundant oracles work in concert to validate data updates during these epochs, enhancing the system's resilience to security threats and data corruption. The effectiveness of this system was tested using the Mnist dataset, a standard in machine learning for benchmarking. Results demonstrate that our blockchain-oriented federated learning approach significantly boosts system resilience, addressing the common challenges of federated environments. This paper aims to make these advanced concepts accessible, even to those with a limited background in blockchain or federated learning. We provide a foundational understanding of how blockchain technology can revolutionize data integrity in decentralized systems and explain the role of oracles in maintaining model accuracy and reliability.

Keywords: federated learning system, block chain, decentralized oracles, hidden markov model

Procedia PDF Downloads 45
4264 Understanding Knowledge Sharing and Its Effect on Creative Performance from a Dyadic Relationship Perspective

Authors: Fan Wei, Tang Yipeng

Abstract:

Knowledge sharing is of great value to organizational performance and innovation ability. However, the mainstream research has focused largely on the impact of knowledge sharing at the team level on individuals and teams. There is a lack of empirical studies on how employees interact in the exchange of knowledge and its effect on employees’ own creative performance. Based on communication accommodation theory and social exchange theory, this article explores the construction of an employee knowledge interaction mechanism under the moderating of social status and introduces the leader's creativity expectation as a moderating variable to explore its cross-level moderating effect on employee knowledge sharing and their own creative performance. An empirical test was conducted on 36 teaching and research teams in the two primary schools, and the results showed that: (1) Explicit/tacit knowledge of employees is positively correlated with acquisition of explicit/tacit knowledge; (2) Colleagues’ evaluations of employees’ social status play a moderating role between the employees’ explicit/tacit knowledge and the acquisition of explicit/tacit knowledge. (3) The leadership creativity expectation positively regulates the relationship between the employees' explicit knowledge acquisition and creative performance. This research helps to open the "black box" of the interpersonal interaction mechanism of knowledge sharing and also provides an important theoretical basis and practical guidance for organizational managers to effectively stimulate employee knowledge sharing and creative performance.

Keywords: knowledge sharing, knowledge interaction, social status, leadership creativity expectations, creative performance

Procedia PDF Downloads 109
4263 Relevance of the Judgements Given by the International Court of Justice with Regard to South China Sea Vis-A-Vis Marshall Islands

Authors: Hitakshi Mahendru, Advait Tambe, Simran Chandok, Niharika Sanadhya

Abstract:

After the Second World War had come to an end, the Founding Fathers of the United Nations recognized a need for a supreme peacekeeping mechanism to act as a mediator between nations and moderate disputes that might blow up, if left unchecked. It has been more than seven decades since the establishment of the International Court of Justice (ICJ). When it was created, there were certain aim and objectives that the ICJ was intended to achieve. However, in today’s world, with change in political dynamics and international relations between countries, the ICJ has not succeeded in achieving several of these objectives. The ICJ is the only body in the international scenario that has the authority to regulate disputes between countries. However, in recent times, with countries like China disregarding the importance of the ICJ, there is no hope for the ICJ to command respect from other nations, thereby sending ICJ on a slow, yet steady path towards redundancy. The authority of the judgements given by the International Court of Justice, which is one of the main pillars of the United Nations, is questionable due to the forthcoming reactions from various countries on public platforms. The ICJ’s principal role within the United Nations framework is to settle peacefully international/bilateral disputes between the states that come under its jurisdiction and in accordance with the principles laid down in international law. By shedding light on the public backlash from the Chinese Government to the recent South China Sea judgement, we see the decreasing relevance of the ICJ in the contemporary world scenario. Philippines and China have wrangled over territory in the South China Sea for centuries but after the recent judgement the tension has reached an all-time high with China threatening to prosecute anybody as trespassers while continuing to militarise the disputed area. This paper will deal with the South China Sea judgement and the manner in which it has been received by the Chinese Government. Also, it will look into the consequences of counter-back. The authors will also look into the Marshall Island matter and propose a model judgement, in accordance with the principles of international law that would be the most suited for the given situation. Also, the authors will propose amendments in the working of the Security Council to ensure that the Marshal Island judgement is passed and accepted by the countries without any contempt.

Keywords: International Court of Justice, international law, Marshall Islands, South China Sea, United Nations Charter

Procedia PDF Downloads 281
4262 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network

Authors: Kamyar Fakhr, Roozbeh Salmani

Abstract:

Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.

Keywords: biometric system, convolutional neural network, cyber-attack, secure

Procedia PDF Downloads 199