Search results for: pilot contamination attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2289

Search results for: pilot contamination attacks

2139 An Evaluation of People’s Susceptibility to Phishing Attacks in Nepal and Effectiveness of the Applied Countermeasures

Authors: Sunil Chaudhary, Rajendra Bahadur Thapa, Eleni Berki, Marko Helenius

Abstract:

The increasing number of Internet and mobile phone users, and essentially those, who use these electronic media to perform online transactions makes Nepal lucrative for phishing attacks. It is one of the reasons behind escalating phishing attacks in the country. Therefore, in this paper we examine various phishing attempts and real scenarios in Nepal to determine the seriousness of the problem. We also want to find out how prepared are the Internet and mobile phone users and how well-equipped are the private sector and government authorities responsible to handle cybercrime in the country. We considered five areas of research study, i.e., legal measures, technical and procedural measures, organizational structure, capacity building and international cooperation. These constitute important factors in cyber security and are recommended by the Global Cyber security Agenda (GCA). On the basis of our findings, we provide essential suggestions to make anti-phishing measures more appropriate to Nepalese State and society.

Keywords: internet banking, mobile banking, e-commerce, phishing, anti-phishing, Nepal

Procedia PDF Downloads 459
2138 Assessment of Drinking Water Contamination from the Water Source to the Consumer in Palapye Region, Botswana

Authors: Tshegofatso Galekgathege

Abstract:

Poor water quality is of great concern to human health as it can cause disease outbreaks. A standard practice today, in developed countries, is that people should be provided with safe-reliable drinking water, as safe drinking water is recognized as a basic human right and a cost effective measure of reducing diseases. Over 1.1 billion people worldwide lack access to a safe water supply and as a result, the majority are forced to use polluted surface or groundwater. It is widely accepted that our water supply systems are susceptible to the intentional or accidental contamination .Water quality degradation may occur anywhere in the path that water takes from the water source to the consumer. Chlorine is believed to be an effective tool in disinfecting water, but its concentration may decrease with time due to consumption by chemical reactions. This shows that we are at the risk of being infected by waterborne diseases if chlorine in water falls below the required level of 0.2-1mg/liter which should be maintained in water and some contaminants enter into the water distribution system. It is believed that the lack of adequate sanitation also contributes to the contamination of water globally. This study therefore, assesses drinking water contamination from the source to the consumer by identifying the point vulnerable to contamination from the source to the consumer in the study area .To identify the point vulnerable to contamination, water was sampled monthly from boreholes, water treatment plant, water distribution system (WDS), service reservoirs and consumer taps from all the twenty (20) villages of Palapye region. Sampled water was then taken to the laboratory for testing and analysis of microbiological and chemical parameters. Water quality analysis were then compared with Botswana drinking water quality standards (BOS32:2009) to see if they comply. Major sources of water contamination identified during site visits were the livestock which were found drinking stagnant water from leaking pipes in 90 percent of the villages. Soils structure around the area was negatively affected because of livestock movement even vegetation in the area. In conclusion microbiological parameters of water in the study area do not comply with drinking water standards, some microbiological parameters in water indicated that livestock do not only affect land degradation but also the quality of water. Chlorine has been applied to water over some years but it is not effective enough thus preventative measures have to be developed, to prevent contaminants from reaching water. Remember: Prevention is better than cure.

Keywords: land degradation, leaking systems, livestock, water contamination

Procedia PDF Downloads 338
2137 To Investigate a Discharge Planning Connect with Long Term Care 2.0 Program in a Medical Center in Taiwan

Authors: Chan Hui-Ya, Ding Shin-Tan

Abstract:

Background and Aim: The discharge planning is considered helpful to reduce the hospital length of stay and readmission rate, and then increased satisfaction with healthcare for patients and professionals. In order to decrease the waiting time of long-term care and boost the care quality of patients after discharge from the hospital, the Ministry of Health and Welfare department in Taiwan initiates a program “discharge planning connects with long-term care 2.0 services” in 2017. The purpose of this study is to investigate the outcome of the pilot of this program in a medical center. Methods: By purpose sampling, the study chose five wards in a medical center as pilot units. The researchers compared the beds of service, the numbers of cases which were transferred to the long-term care center and transferred rates per month between the pilot units and the other units, and analyze the basic data, the long-term care service needs and the approval service items of cases transfer to the long-term care center in pilot units. Results: From June to September 2017, a total of 92 referrals were made, and 51 patients were enrolled into the pilot program. There is a significant difference of transferring rate between the pilot units and the other units (χ = 702.6683, p < 0.001). Only 20 cases (39.2% success rate) were approved to accept the parts of service items of long-term care in the pilot units. The most approval item was respite care service (n = 13; 65%), while it was third at needs ranking of service lists during linking services process. Among the reasons of patients who cancelled the request, 38.71% reasons were related to the services which could not match the patients’ needs and expectation. Conclusion: The results indicate there is a requirement to modify the long-term care services to fit the needs of cases. The researchers suggest estimating the potential cases by screening data from hospital informatics systems and to hire more case manager according the service time of potential cases. Meanwhile, the strategies shortened the assessment scale and authorized hospital case managers to approve some items of long-term care should be considered.

Keywords: discharge planning, long-term care, case manager, patient care

Procedia PDF Downloads 264
2136 Pattern of External Injuries Sustained during Bomb Blast Attacks in Karachi, Pakistan from 2000 to 2007

Authors: Arif Anwar Surani, Salman Ali, Asif Surani, Sohaib Zahid, Akbar Shoukat Ali, Zeeshan-Ul-Hassan Usmani, Joseph Varon, Salim Surani

Abstract:

Objective: Terrorism and suicidal bomb blast attacks are commonplace in Karachi, Pakistan. During the years 2000 to 2007, there were over 60 bomb explosions resulting in more than 1500 casualties. These explosions produce a wide variety of external injuries. We undertook this study to evaluate pattern of external injury produced after bomb blast attacks and to compare injury profile resulting from explosions in open versus semi-confined blast environments. Method: A retrospective, cross-sectional, study was conducted to review injuries sustained after bomb blast attacks in Karachi, Pakistan, from January 2000 to October 2007. Emergency medical records and medico legal certificates of patients presented to three major public sector hospitals of Karachi were evaluated using self-design proforma. Results: Data of 481 victims meet inclusion criteria and were incorporated for final analysis. Of these, 63.6% were injured in open spaces and 36.4% were injured in semi-confined blast environments. Lacerations were commonly encountered as external injury (47.7%) followed by penetrating wounds (15.3%). Lower and upper extremities were most commonly affected (38.6% and 19% respectively). Open and semi-confined blast environments produced a specific injury pattern and profile (p=<0.001). Conclusions: Bomb blast attacks in Karachi produce an external injury pattern consistent with other studies, with exception of an increased frequency in penetrating wounds. Semi-confined blast environments were associated with severe injuries. Further studies are required to better classify injuries and their severity based on standardized scoring systems. Effective emergency response systems must be designed to cope with mass causalities following bomb explosions.

Keywords: bomb blast attacks, injury pattern, external injury, open space, semi-confined space, blast environment

Procedia PDF Downloads 377
2135 Fly ash Contamination in Groundwater and its Implications on Local Climate Change

Authors: Rajkumar Ghosh

Abstract:

Fly ash, a byproduct of coal combustion, has become a prevalent environmental concern due to its potential impact on both groundwater quality and local climate change. This study aims to provide an in-depth analysis of the various mechanisms through which fly ash contaminates groundwater, as well as the possible consequences of this contamination on local climate change. The presence of fly ash in groundwater not only poses a risk to human health but also has the potential to influence local climate change through complex interactions. Although fly ash has various applications in construction and other industries, improper disposal and lack of containment measures have led to its infiltration into groundwater systems. Through a comprehensive review of existing literature and case studies, the interactions between fly ash and groundwater systems, assess the effects on hydrology, and discuss the implications for the broader climate. This section reviews the pathways through which fly ash enters groundwater, including leaching from disposal sites, infiltration through soil, and migration from surface water bodies. The physical and chemical characteristics of fly ash that contribute to its mobility and persistence in groundwater. The introduction of fly ash into groundwater can alter its chemical composition, leading to an increase in the concentration of heavy metals, metalloids, and other potentially toxic elements. The mechanisms of contaminant transport and highlight the potential risks to human health and ecosystems. Fly ash contamination in groundwater may influence the hydrological cycle through changes in groundwater recharge, discharge, and flow dynamics. This section examines the implications of altered hydrology on local water availability, aquatic habitats, and overall ecosystem health. The presence of fly ash in groundwater may have direct and indirect effects on local climate change. The role of fly ash as a potent greenhouse gas absorber and its contribution to radiative forcing. Additionally, investigation of the possible feedback mechanisms between groundwater contamination and climate change, such as altered vegetation patterns and changes in local temperature and precipitation patterns. In this section, potential mitigation and remediation techniques to minimize fly ash contamination in groundwater are analyzed. These may include improved waste management practices, engineered barriers, groundwater remediation technologies, and sustainable fly ash utilization. This paper highlights the critical link between fly ash contamination in groundwater and its potential contribution to local climate change. It emphasizes the importance of addressing this issue promptly through a combination of preventive measures, effective management strategies, and continuous monitoring. By understanding the interconnections between fly ash contamination, groundwater quality, and local climate, towards creating a more resilient and sustainable environment for future generations. The findings of this research can assist policymakers and environmental managers in formulating sustainable strategies to mitigate fly ash contamination and minimize its contribution to climate change.

Keywords: groundwater, climate, sustainable environment, fly ash contamination

Procedia PDF Downloads 56
2134 A Cognitive Behavioural Therapy for Post-Traumatic Stress Disorders

Authors: Ryotaro Ishikawa

Abstract:

INTRODUCTION: Post-traumatic stress disorder (PTSD) is a psychiatric label for a collection of psychological symptoms following a traumatic event. PTSD is as a result of a traumatic experience such as rape or sexual assault. A victim may have PTSD if she/he has experienced the following symptoms for at least a month: a) Stressor, b) Intrusion symptoms, c) Avoidance, d) Negative alterations in cognitions and mood, e) Alterations in arousal and reactivity. Studies on the cognitive theory of PTSD emphasized the roles of (a) negative appraisals of trauma memories in maintaining the symptomatology of PTSD, and (b) disorganized trauma memories in the development of PTSD. Mental contamination is primarily caused by experiences involving humans (e.g. violators or perpetrators) as opposed to substances (e.g. dirt or bodily fluids). Feelings of mental contamination may evoke following experiences of ill-treatment, sexual assault, domination, degradation, manipulation, betrayal, or humiliation. Some studies have demonstrated that traumatic thoughts related to sexual assault are particularly strong predictors of mental contamination. Treatment protocols based on cognitive-behavioral therapy appear to be beneficial in reducing the severity of PTSD and mental contamination. Studies on the cognitive theory of PTSD emphasized the roles of (A) negative appraisals of trauma memories in maintaining the symptomatology of PTSD, and (B) disorganized trauma memories in the development of PTSD. We will demonstrate a feasibility study of individual CBT for PTSD and mental contamination in Japanese clinical settings. METHOD: The single-arm trial is a group setting CBT intervention. The primary outcome is the self-rated Posttraumatic Stress Diagnostic Scale, with secondary measurements of depressive severity and mental pollution questionnaire. Assessments are conducted at baseline, after a waiting period before CBT, during CBT, and after CBT. RESULTS: Participants are eligible for the study and complete the outcome measures at all assessment points. In our hypothesis, receiving CBT would lead to improvements in primary and secondary PTSD severity. CONCLUSION: We will demonstrate a feasibility study of individual CBT for PTSD and mental contamination in Japanese clinical settings. Our treatment would achieve favorable treatment outcomes for PTSD with mental contamination in Japanese clinical settings.

Keywords: CBT, cognitive theory, PTSD, mental pollution

Procedia PDF Downloads 413
2133 Detection of Arcobacter and Helicobacter pylori Contamination in Organic Vegetables by Cultural and Polymerase Chain Reaction (PCR) Methods

Authors: Miguel García-Ferrús, Ana González, María A. Ferrús

Abstract:

The most demanded organic foods worldwide are those that are consumed fresh, such as fruits and vegetables. However, there is a knowledge gap about some aspects of organic food microbiological quality and safety. Organic fruits and vegetables are more exposed to pathogenic microorganisms due to surface contact with natural fertilizers such as animal manure, wastes and vermicompost used during farming. It has been suggested that some emergent pathogens, such as Helicobacter pylori or Arcobacter spp., could reach humans through the consumption of raw or minimally processed vegetables. Therefore, the objective of this work was to study the contamination of organic fresh green leafy vegetables by Arcobacter spp. and Helicobacter pylori. For this purpose, a total of 24 vegetable samples, 13 lettuce and 11 spinach were acquired from 10 different ecological supermarkets and greengroceries and analyzed by culture and PCR. Arcobacter spp. was detected in 5 samples (20%) by PCR, 4 spinach and one lettuce. One spinach sample was found to be also positive by culture. For H. pylori, the H. pylori VacA gene-specific band was detected in 12 vegetable samples (50%), 10 lettuces and 2 spinach. Isolation in the selective medium did not yield any positive result, possibly because of low contamination levels together with the presence of the organism in its viable but non-culturable form. Results showed significant levels of H. pylori and Arcobacter contamination in organic vegetables that are generally consumed raw, which seems to confirm that these foods can act as transmission vehicles to humans.

Keywords: Arcobacter sp., Helicobacter pylori, Organic Vegetables, Polymerase Chain Reaction (PCR)

Procedia PDF Downloads 141
2132 Adsorption Mechanism of Heavy Metals and Organic Pesticide on Industrial Construction and Demolition Waste and Its Runoff Behaviors

Authors: Sheng Huang, Xin Zhao, Xiaofeng Gao, Tao Zhou, Shijin Dai, Youcai Zhao

Abstract:

Adsorption of heavy metal pollutants (Zn, Cd, Pb, Cr, Cu) and organic pesticide (phorate, dithiophosphate diethyl, triethyl phosphorothioate), along with their multi-contamination on the surface of industrial construction & demolition waste (C&D waste) was investigated. Brick powder was selected as the appropriate waste while its maximum equilibrium adsorption amount of heavy metal under single controlled contamination matrix reached 5.41, 0.81, 0.45, 1.13 and 0.97 mg/g, respectively. Effects of pH and spiking dose of ICDW was also investigated. Equilibrium adsorption amount of organic pesticide varied from 0.02 to 0.97 mg/g, which was negatively correlated to the size distribution and hydrophilism. Existence of organic pesticide on surface of ICDW caused various effects on the heavy metal adsorption, mainly due to combination of metal ions and the floccule formation along with wrapping behaviors by pesticide pollutants. Adsorption of Zn was sharply decreased from 7.1 to 0.15 mg/g compared with clean ICDW and phorate contaminated ICDW, while that of Pb, Cr and Cd experienced an increase- then decrease procedure. On the other hand, runoff of pesticide contaminants was investigated under 25 mm/h simulated rainfall. Results showed that the cumulative runoff amount fitted well with curve obtained from a power function, of which r2=0.95 and 0.91 for 1DAA (1 day between contamination and runoff) and 7DAA, respectively. This study helps provide evaluation of industrial construction and demolition waste contamination into aquatic systems.

Keywords: adsorption mechanism, industrial construction waste, metals, pesticide, runoff

Procedia PDF Downloads 443
2131 An Evaluative Microbiological Risk Assessment of Drinking Water Supply in the Carpathian Region: Identification of Occurrent Hazardous Bacteria with Quantitative Microbial Risk Assessment Method

Authors: Anikó Kaluzsa

Abstract:

The article's author aims to introduce and analyze those microbiological safety hazards which indicate the presence of secondary contamination in the water supply system. Since drinking water belongs to primary foods and is the basic condition of life, special attention should be paid on its quality. There are such indicators among the microbiological features can be found in water, which are clear evidence of the presence of water contamination, and based on this there is no need to perform other diagnostics, because they prove properly the contamination of the given water supply section. Laboratory analysis can help - both technologically and temporally – to identify contamination, but it does matter how long takes the removal and if the disinfection process takes place in time. The identification of the factors that often occur in the same places or the chance of their occurrence is greater than the average, facilitates our work. The pathogen microbiological risk assessment by the help of several features determines the most likely occurring microbiological features in the Carpathian basin. From among all the microbiological indicators, that are recommended targets for routine inspection by the World Health Organization, there is a paramount importance of the appearance of Escherichia coli in the water network, as its presence indicates the potential ubietiy of enteric pathogens or other contaminants in the water network. In addition, the author presents the steps of microbiological risk assessment analyzing those pathogenic micro-organisms registered to be the most critical.

Keywords: drinking water, E. coli, microbiological indicators, risk assessment, water safety plan

Procedia PDF Downloads 310
2130 Analysis of Threats in Interoperability of Medical Devices

Authors: M. Sandhya, R. M. Madhumitha, Sharmila Sankar

Abstract:

Interoperable medical devices (IMDs) face threats due to the increased attack surface accessible by interoperability and the corresponding infrastructure. Initiating networking and coordination functionalities primarily modify medical systems' security properties. Understanding the threats is a vital first step in ultimately crafting security solutions for such systems. The key to this problem is coming up with some common types of threats or attacks with those of security and privacy, and providing this information as a roadmap. This paper analyses the security issues in interoperability of devices and presents the main types of threats that have to be considered to build a secured system.

Keywords: interoperability, threats, attacks, medical devices

Procedia PDF Downloads 308
2129 The Effect of Chisel Edge on Drilling-Induced Delamination

Authors: Parnian Kianfar, Navid Zarif Karimi, Giangiacomo Minak

Abstract:

Drilling is one of the most important machining operations as numerous holes must be drilled in order to install mechanical fasteners for assembly in composite structures. Delamination is a major problem associated with the drilling of fiber reinforced composite materials, which degrades the mechanical properties of these materials. In drilling, delamination is initiated when the drilling force exceeds a threshold value, particularly at the critical entry and exit locations of the drill bit. The chisel edge of twist drill is a major contributor to the thrust force which is the primary cause of delamination. The main objective of this paper is to study the effect of chisel edge and pilot hole on thrust force and delamination during drilling of glass fiber reinforced composites. For this purpose, two sets of experiments, with and without pilot hole, were conducted with different drilling conditions. The results show a great reduction in the thrust force when a pilot hole is present which removes the chisel edge contribution.

Keywords: composites, chisel edge, drilling, delamination

Procedia PDF Downloads 416
2128 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement

Authors: Mohan Ramasundaram, Amutha Prabakar Muniyandi

Abstract:

Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient.

Keywords: Telecare Medicine Information System, elliptic curve cryptography, three-factor, biometric, random oracle

Procedia PDF Downloads 199
2127 Evaluation of Inceptor Design for Manned Multicopter

Authors: Jędrzej Minda

Abstract:

In aviation, a very narrow spectrum of control inceptors exists, namely centre sticks, side-sticks, pedals, and yokes. However, new types of aircraft are emerging, and with them, a need for new inceptors. A manned multicopter created at AGH University of Science and Technology is an aircraft in which the pilot takes a specific orientation in which classical inceptors may be impractical to use. In this paper, a unique kind of control inceptor is described, which aims to provide a handling quality not unlike standard solutions, and provide a firm grip point for the pilot without the risk of involuntary stick movement. Simulations of the pilot-inceptor model were performed in order to compare the dynamic amplification factors of the design described in this paper with the classical one. A functional prototype is built on which drone pilots carry out a comfort-of-use evaluation. This paper provides a general overview of the project, including a literature review, reasoning behind components selection, and mechanism design finalized by conclusions.

Keywords: mechanisms, mechatronics, embedded control, serious gaming for training rescue missions, rescue robotics

Procedia PDF Downloads 61
2126 Numerical Analysis of a Pilot Solar Chimney Power Plant

Authors: Ehsan Gholamalizadeh, Jae Dong Chung

Abstract:

Solar chimney power plant is a feasible solar thermal system which produces electricity from the Sun. The objective of this study is to investigate buoyancy-driven flow and heat transfer through a built pilot solar chimney system called 'Kerman Project'. The system has a chimney with the height and diameter of 60 m and 3 m, respectively, and the average radius of its solar collector is about 20 m, and also its average collector height is about 2 m. A three-dimensional simulation was conducted to analyze the system, using computational fluid dynamics (CFD). In this model, radiative transfer equation was solved using the discrete ordinates (DO) radiation model taking into account a non-gray radiation behavior. In order to modelling solar irradiation from the sun’s rays, the solar ray tracing algorithm was coupled to the computation via a source term in the energy equation. The model was validated with comparing to the experimental data of the Manzanares prototype and also the performance of the built pilot system. Then, based on the numerical simulations, velocity and temperature distributions through the system, the temperature profile of the ground surface and the system performance were presented. The analysis accurately shows the flow and heat transfer characteristics through the pilot system and predicts its performance.

Keywords: buoyancy-driven flow, computational fluid dynamics, heat transfer, renewable energy, solar chimney power plant

Procedia PDF Downloads 233
2125 A Retrospective Study of the Effects of Xenophobia on South Africa-Nigeria Relations

Authors: O. Fayomi, F. Chidozie, C. Ayo

Abstract:

The underlying causes of xenophobia are complex and varied. Xenophobia has to do with being contemptuous of that which is foreign, especially of strangers or of people from different countries or cultures. Unemployment and mounting poverty among South Africans at the bottom of the economic ladder have provoked fears of the competition that better educated and experienced migrants can represent. South Africa’s long track-record of violence as a means of protest and the targeting of foreigners in particular, and, the documented tensions over migration policy and the scale of repatriation serve a very good explanation for its xenophobia. It was clear that while most of the attacks were directed against foreign, primarily African, migrants, this was not the rule. Attacks were also noted against Chinese-speakers, Pakistani migrants as well as against South Africans from minority language groups (in the conflict areas). Settlements that have recently experienced the expression of ‘xenophobic’ violence have also been the site of violent and other forms of protest around other issues, most notably service delivery. The failure of government in service delivery was vexed on this form of xenophobia. Due to the increase in migration, this conflict is certainly not temporary in nature. Xenophobia manifests in different regions and communities with devastating effects on the affected nationals. Nigerians living in South Africa have been objects of severe attacks and assault as a result of this xenophobic attitude. It is against this background that this study seeks to investigate the xenophobic attacks against Nigerians in South Africa. The methodology is basically qualitative with the use of secondary sources such as books, journals, newspapers and internet sources.

Keywords: xenophobia, unemployment, poverty, Nigeria, South Africa

Procedia PDF Downloads 452
2124 Online or Offline: A Pilot Study of Blended Ear-Training Course

Authors: Monika Benedek

Abstract:

This paper intends to present a pilot study of blended ear-training course at a Finnish university. The course ran for ten weeks and included both traditional (offline) group lessons for 90 minutes each week and an online learning platform. Twelve students majored in musicology and music education participated in the course. The aims of pilot research were to develop a new blended ear-training course at university level, to determine the ideal amount of workload in each part of the blended instruction (offline and online) and to develop the course material. The course material was selected from the Classical period in order to develop students’ aural skills together with their stylistic knowledge. Students were asked to provide written feedback of the course content and learning approaches of face-to-face group lessons and online learning platform each week during the course. Therefore, the teaching material is continuously planned for each week. This qualitative data collection and weekly analysis of data are on progress. However, based on the teacher-researcher’s experiences and the students’ feedback already collected, it could be seen that the blended instruction would be an ideal teaching strategy for ear-trainging at the music programmes of universities to develop students’ aural skills and stylistic knowledge. It is also presumed that such blended instruction with less workload would already improve university students’ aural skills and related musicianship skills. The preliminary findings of research also indicated that students generally found those ear-training tasks the most useful to learn online that combined listening, singing, singing and playing an instrument. This paper intends to summarise the final results of the pilot study.

Keywords: blended-learning, ear-training, higher music education, online-learning, pilot study

Procedia PDF Downloads 141
2123 A Phishing Email Detection Approach Using Machine Learning Techniques

Authors: Kenneth Fon Mbah, Arash Habibi Lashkari, Ali A. Ghorbani

Abstract:

Phishing e-mails are a security issue that not only annoys online users, but has also resulted in significant financial losses for businesses. Phishing advertisements and pornographic e-mails are difficult to detect as attackers have been becoming increasingly intelligent and professional. Attackers track users and adjust their attacks based on users’ attractions and hot topics that can be extracted from community news and journals. This research focuses on deceptive Phishing attacks and their variants such as attacks through advertisements and pornographic e-mails. We propose a framework called Phishing Alerting System (PHAS) to accurately classify e-mails as Phishing, advertisements or as pornographic. PHAS has the ability to detect and alert users for all types of deceptive e-mails to help users in decision making. A well-known email dataset has been used for these experiments and based on previously extracted features, 93.11% detection accuracy is obtainable by using J48 and KNN machine learning techniques. Our proposed framework achieved approximately the same accuracy as the benchmark while using this dataset.

Keywords: phishing e-mail, phishing detection, anti phishing, alarm system, machine learning

Procedia PDF Downloads 315
2122 Application of Chinese Remainder Theorem to Find The Messages Sent in Broadcast

Authors: Ayubi Wirara, Ardya Suryadinata

Abstract:

Improper application of the RSA algorithm scheme can cause vulnerability to attacks. The attack utilizes the relationship between broadcast messages sent to the user with some fixed polynomial functions that belong to each user. Scheme attacks carried out by applying the Chinese Remainder Theorem to obtain a general polynomial equation with the same modulus. The formation of the general polynomial becomes a first step to get back the original message. Furthermore, to solve these equations can use Coppersmith's theorem.

Keywords: RSA algorithm, broadcast message, Chinese Remainder Theorem, Coppersmith’s theorem

Procedia PDF Downloads 321
2121 Ochratoxin-A in Traditional Meat Products from Croatian Households

Authors: Jelka Pleadin, Nina Kudumija, Ana Vulic, Manuela Zadravec, Tina Lesic, Mario Skrivanko, Irena Perkovic, Nada Vahcic

Abstract:

Products of animal origin, such as meat and meat products, can contribute to human mycotoxins’ intake coming as a result of either indirect transfer from farm animals exposed to naturally contaminated grains and feed (carry-over effects) or direct contamination with moulds or naturally contaminated spice mixtures used in meat production. Ochratoxin A (OTA) is mycotoxin considered to be of the outermost importance from the public health standpoint in connection with meat products. The aim of this study was to investigate the occurrence of OTA in different traditional meat products circulating on Croatian markets during 2018, produced by a large number of households situated in eastern and north Croatian regions using a variety of technologies. Concentrations of OTA were determined in traditional meat products (n = 70), including dry fermented sausages (Slavonian kulen, Slavonian sausage, Istrian sausage and domestic sausage; n = 28), dry-cured meat products (pancetta, pork rack and ham; n = 22) and cooked sausages (liver sausages, black pudding sausages and pate; n = 20). OTA was analyzed by use of quantitative screening immunoassay method (ELISA) and confirmed for positive samples (higher than the limit of detection) by liquid chromatography tandem mass spectrometry (LC-MS/MS) method. Whereas the bacon samples contaminated with OTA were not found, its level in dry fermented sausages ranged from 0.22 to 2.17 µg/kg and in dry-cured meat products from 0.47 to 5.35 µg/kg, with in total 9% of positive samples. Besides possible primary contamination of these products arising due to improper manufacturing or/and storage conditions, observed OTA contamination could also be the consequence of secondary contamination that comes as a result of contaminated feed the animals were fed on. OTA levels obtained in cooked sausages ranged from 0.32 to 4.12 µg/kg (5% of positives) and could probably be linked to the contaminated raw materials (liver, kidney and spices) used in the sausages production. The results showed an occasional OTA contamination of traditional meat products, pointing that to avoid such contamination on households these products should be produced and processed under standardized and well-controlled conditions. Further investigations should be performed in order to identify mycotoxin-producing moulds on the surface of the products and to define preventative measures that can reduce the contamination of traditional meat products during their production on households and period of storage.

Keywords: Croatian households, ochratoxin-A, traditional cooked sausages, traditional dry-cured meat products

Procedia PDF Downloads 158
2120 Impact of Fluoride Contamination on Soil and Water at North 24 Parganas, West Bengal, India

Authors: Rajkumar Ghosh

Abstract:

Fluoride contamination is a growing concern in various regions across the globe, including North 24 Parganas in West Bengal, India. The presence of excessive fluoride in the environment can have detrimental effects on crops, soil quality, and water resources. This note aims to shed light on the implications of fluoride contamination and its impact on the agricultural sector in North 24 Parganas. The agricultural lands in North 24 Parganas have been significantly affected by fluoride contamination, leading to adverse consequences for crop production. Excessive fluoride uptake by plants can hinder their growth, reduce crop yields, and impact the quality of agricultural produce. Certain crops, such as paddy, vegetables, and fruits, are more susceptible to fluoride toxicity, resulting in stunted growth, leaf discoloration, and reduced nutritional value. Fluoride-contaminated water, often used for irrigation, contributes to the accumulation of fluoride in the soil. Over time, this can lead to soil degradation and reduced fertility. High fluoride levels can alter soil pH, disrupt the availability of essential nutrients, and impair microbial activity critical for nutrient cycling. Consequently, the overall health and productivity of the soil are compromised, making it increasingly challenging for farmers to sustain agricultural practices. Fluoride contamination in North 24 Parganas extends beyond the soil and affects water resources as well. The excess fluoride seeps into groundwater, making it unsafe for consumption. Long-term consumption of fluoride-contaminated water can lead to various health issues, including dental and skeletal fluorosis. These health concerns pose significant risks to the local population, especially those reliant on contaminated water sources for their daily needs. Addressing fluoride contamination requires concerted efforts from various stakeholders, including government authorities, researchers, and farmers. Implementing appropriate water treatment technologies, such as defluoridation units, can help reduce fluoride levels in drinking water sources. Additionally, promoting alternative irrigation methods and crop diversification strategies can aid in mitigating the impact of fluoride on agricultural productivity. Furthermore, creating awareness among farmers about the adverse effects of fluoride contamination and providing access to alternative water sources are crucial steps toward safeguarding the health of the community and sustaining agricultural activities in the region. Fluoride contamination poses significant challenges to crop production, soil health, and water resources in North 24 Parganas, West Bengal. It is imperative to prioritize efforts to address this issue effectively and implement appropriate measures to mitigate fluoride contamination. By adopting sustainable practices and promoting awareness, the community can work towards restoring the agricultural productivity, soil quality and ensuring access to safe drinking water in the region.

Keywords: fluoride contamination, drinking water, toxicity, soil health

Procedia PDF Downloads 69
2119 Total and Leachable Concentration of Trace Elements in Soil towards Human Health Risk, Related with Coal Mine in Jorong, South Kalimantan, Indonesia

Authors: Arie Pujiwati, Kengo Nakamura, Noriaki Watanabe, Takeshi Komai

Abstract:

Coal mining is well known to cause considerable environmental impacts, including trace element contamination of soil. This study aimed to assess the trace element (As, Cd, Co, Cu, Ni, Pb, Sb, and Zn) contamination of soil in the vicinity of coal mining activities, using the case study of Asam-asam River basin, South Kalimantan, Indonesia, and to assess the human health risk, incorporating total and bioavailable (water-leachable and acid-leachable) concentrations. The results show the enrichment of As and Co in soil, surpassing the background soil value. Contamination was evaluated based on the index of geo-accumulation, Igeo and the pollution index, PI. Igeo values showed that the soil was generally uncontaminated (Igeo ≤ 0), except for elevated As and Co. Mean PI for Ni and Cu indicated slight contamination. Regarding the assessment of health risks, the Hazard Index, HI showed adverse risks (HI > 1) for Ni, Co, and As. Further, Ni and As were found to pose unacceptable carcinogenic risk (risk > 1.10-5). Farming, settlement, and plantation were found to present greater risk than coal mines. These results show that coal mining activity in the study area contaminates the soils by particular elements and may pose potential human health risk in its surrounding area. This study is important for setting appropriate countermeasure actions and improving basic coal mining management in Indonesia.

Keywords: coal mine, risk, trace elements, soil

Procedia PDF Downloads 236
2118 Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems

Authors: Borhan Marzougui

Abstract:

Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives.

Keywords: IoT, DDoS, attacks, botnet, security, agents

Procedia PDF Downloads 119
2117 Geostatistical Analysis of Contamination of Soils in an Urban Area in Ghana

Authors: S. K. Appiah, E. N. Aidoo, D. Asamoah Owusu, M. W. Nuonabuor

Abstract:

Urbanization remains one of the unique predominant factors which is linked to the destruction of urban environment and its associated cases of soil contamination by heavy metals through the natural and anthropogenic activities. These activities are important sources of toxic heavy metals such as arsenic (As), cadmium (Cd), chromium (Cr), copper (Cu), iron (Fe), manganese (Mn), and lead (Pb), nickel (Ni) and zinc (Zn). Often, these heavy metals lead to increased levels in some areas due to the impact of atmospheric deposition caused by their proximity to industrial plants or the indiscriminately burning of substances. Information gathered on potentially hazardous levels of these heavy metals in soils leads to establish serious health and urban agriculture implications. However, characterization of spatial variations of soil contamination by heavy metals in Ghana is limited. Kumasi is a Metropolitan city in Ghana, West Africa and is challenged with the recent spate of deteriorating soil quality due to rapid economic development and other human activities such as “Galamsey”, illegal mining operations within the metropolis. The paper seeks to use both univariate and multivariate geostatistical techniques to assess the spatial distribution of heavy metals in soils and the potential risk associated with ingestion of sources of soil contamination in the Metropolis. Geostatistical tools have the ability to detect changes in correlation structure and how a good knowledge of the study area can help to explain the different scales of variation detected. To achieve this task, point referenced data on heavy metals measured from topsoil samples in a previous study, were collected at various locations. Linear models of regionalisation and coregionalisation were fitted to all experimental semivariograms to describe the spatial dependence between the topsoil heavy metals at different spatial scales, which led to ordinary kriging and cokriging at unsampled locations and production of risk maps of soil contamination by these heavy metals. Results obtained from both the univariate and multivariate semivariogram models showed strong spatial dependence with range of autocorrelations ranging from 100 to 300 meters. The risk maps produced show strong spatial heterogeneity for almost all the soil heavy metals with extremely risk of contamination found close to areas with commercial and industrial activities. Hence, ongoing pollution interventions should be geared towards these highly risk areas for efficient management of soil contamination to avert further pollution in the metropolis.

Keywords: coregionalization, heavy metals, multivariate geostatistical analysis, soil contamination, spatial distribution

Procedia PDF Downloads 278
2116 Groundwater Contamination and Fluorosis: A Comprehensive Analysis

Authors: Rajkumar Ghosh, Bhabani Prasad Mukhopadhay

Abstract:

Groundwater contamination with fluoride has emerged as a global concern affecting millions of people, leading to the widespread occurrence of fluorosis. It affects bones and teeth, leading to dental and skeletal fluorosis. This study presents a comprehensive analysis of the relationship between groundwater contamination and fluorosis. It delves into the causes of fluoride contamination in groundwater, its spatial distribution, and adverse health impacts of fluorosis on affected communities. Fluoride contamination in groundwater can be attributed to both natural and anthropogenic sources. Geogenic sources involve the dissolution of fluoride-rich minerals present in the aquifer materials. On the other hand, anthropogenic activities such as industrial discharges, agricultural practices, and improper disposal of fluoride-containing waste contribute to the contamination of groundwater. The spatial distribution of fluoride contamination varies widely across different regions and geological formations. High fluoride levels are commonly observed in areas with fluorine-rich geological deposits. Additionally, agricultural and industrial centres often exhibit elevated fluoride concentrations due to anthropogenic contributions. Excessive fluoride ingestion during tooth development leads to dental fluorosis, characterized by enamel defects, discoloration, and dental caries. The severity of dental fluorosis varies based on fluoride exposure levels during tooth development. Long-term consumption of fluoride-contaminated water causes skeletal fluorosis, resulting in bone and joint pain, decreased joint mobility, and skeletal deformities. In severe cases, skeletal fluorosis can lead to disability and reduced quality of life. Various defluoridation techniques such as activated alumina, bone char, and reverse osmosis have been employed to reduce fluoride concentrations in drinking water. These methods effectively remove fluoride, but their implementation requires careful consideration of cost, maintenance, and sustainability. Diversifying water sources, such as rainwater harvesting and surface water supply, can reduce the reliance on fluoride-contaminated groundwater, especially in regions with high fluoride concentrations. Groundwater contamination with fluoride remains a significant public health challenge, leading to the widespread occurrence of fluorosis globally. This scientific report emphasizes the importance of understanding the relationship between groundwater contamination and fluorosis. Implementing effective mitigation strategies and preventive measures is crucial to combat fluorosis and ensure sustainable access to safe drinking water for communities worldwide. Collaborative efforts between government agencies, local communities, and scientific researchers are essential to address this issue and safeguard the health of vulnerable populations. Additionally, the report explores various mitigation strategies and preventive measures to address the issue and offers recommendations for sustainable management of groundwater resources to combat fluorosis effectively.

Keywords: fluorosis, fluoride contamination, groundwater contamination, groundwater resources

Procedia PDF Downloads 68
2115 Cyber-Med: Practical Detection Methodology of Cyber-Attacks Aimed at Medical Devices Eco-Systems

Authors: Nir Nissim, Erez Shalom, Tomer Lancewiki, Yuval Elovici, Yuval Shahar

Abstract:

Background: A Medical Device (MD) is an instrument, machine, implant, or similar device that includes a component intended for the purpose of the diagnosis, cure, treatment, or prevention of disease in humans or animals. Medical devices play increasingly important roles in health services eco-systems, including: (1) Patient Diagnostics and Monitoring; Medical Treatment and Surgery; and Patient Life Support Devices and Stabilizers. MDs are part of the medical device eco-system and are connected to the network, sending vital information to the internal medical information systems of medical centers that manage this data. Wireless components (e.g. Wi-Fi) are often embedded within medical devices, enabling doctors and technicians to control and configure them remotely. All these functionalities, roles, and uses of MDs make them attractive targets of cyber-attacks launched for many malicious goals; this trend is likely to significantly increase over the next several years, with increased awareness regarding MD vulnerabilities, the enhancement of potential attackers’ skills, and expanded use of medical devices. Significance: We propose to develop and implement Cyber-Med, a unique collaborative project of Ben-Gurion University of the Negev and the Clalit Health Services Health Maintenance Organization. Cyber-Med focuses on the development of a comprehensive detection framework that relies on a critical attack repository that we aim to create. Cyber-Med will allow researchers and companies to better understand the vulnerabilities and attacks associated with medical devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The Cyber-Med detection framework will consist of two independent, but complementary detection approaches: one for known attacks, and the other for unknown attacks. These modules incorporate novel ideas and algorithms inspired by our team's domains of expertise, including cyber security, biomedical informatics, and advanced machine learning, and temporal data mining techniques. The establishment and maintenance of Cyber-Med’s up-to-date attack repository will strengthen the capabilities of Cyber-Med’s detection framework. Major Findings: Based on our initial survey, we have already found more than 15 types of vulnerabilities and possible attacks aimed at MDs and their eco-system. Many of these attacks target individual patients who use devices such pacemakers and insulin pumps. In addition, such attacks are also aimed at MDs that are widely used by medical centers such as MRIs, CTs, and dialysis engines; the information systems that store patient information; protocols such as DICOM; standards such as HL7; and medical information systems such as PACS. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched against MDs. Very little research has been conducted in order to protect these devices from cyber-attacks, since most of the development and engineering efforts are aimed at the devices’ core medical functionality, the contribution to patients’ healthcare, and the business aspects associated with the medical device.

Keywords: medical device, cyber security, attack, detection, machine learning

Procedia PDF Downloads 340
2114 A Survey of Attacks and Security Requirements in Wireless Sensor Networks

Authors: Vishnu Pratap Singh Kirar

Abstract:

Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.

Keywords: wireless sensor network (WSN), wireless network attacks, wireless network security, security requirements

Procedia PDF Downloads 461
2113 Role of Foreign Direct Investment in Economic Growth of Pakistan

Authors: Nayyra Zeb, Fu Qiang, Sundas Rauf

Abstract:

Foreign Direct Investment (FDI) is often seen as a significant factor of economic development in developing countries like Pakistan. The aim of this article is to investigate the effect of FDI on Pakistan’s economic growth during 1972–2012. Besides FDI, three other variables such as trade openness, political instability and terrorist attacks are also used in this study. The least square method has been applied to check the effect of these variables on GDP of Pakistan. The results show that FDI has a positive significant effect on economic growth of Pakistan.

Keywords: FDI inflows, trade openness, political instability, terrorist attacks

Procedia PDF Downloads 437
2112 Applying the Regression Technique for ‎Prediction of the Acute Heart Attack ‎

Authors: Paria Soleimani, Arezoo Neshati

Abstract:

Myocardial infarction is one of the leading causes of ‎death in the world. Some of these deaths occur even before the patient ‎reaches the hospital. Myocardial infarction occurs as a result of ‎impaired blood supply. Because the most of these deaths are due to ‎coronary artery disease, hence the awareness of the warning signs of a ‎heart attack is essential. Some heart attacks are sudden and intense, but ‎most of them start slowly, with mild pain or discomfort, then early ‎detection and successful treatment of these symptoms is vital to save ‎them. Therefore, importance and usefulness of a system designing to ‎assist physicians in the early diagnosis of the acute heart attacks is ‎obvious.‎ The purpose of this study is to determine how well a predictive ‎model would perform based on the only patient-reportable clinical ‎history factors, without using diagnostic tests or physical exams. This ‎type of the prediction model might have application outside of the ‎hospital setting to give accurate advice to patients to influence them to ‎seek care in appropriate situations. For this purpose, the data were ‎collected on 711 heart patients in Iran hospitals. 28 attributes of clinical ‎factors can be reported by patients; were studied. Three logistic ‎regression models were made on the basis of the 28 features to predict ‎the risk of heart attacks. The best logistic regression model in terms of ‎performance had a C-index of 0.955 and with an accuracy of 94.9%. ‎The variables, severe chest pain, back pain, cold sweats, shortness of ‎breath, nausea, and vomiting were selected as the main features.‎

Keywords: Coronary heart disease, Acute heart attacks, Prediction, Logistic ‎regression‎

Procedia PDF Downloads 431
2111 The Friction Of Oil Contaminated Granular Soils; Experimental Study

Authors: Miron A, Tadmor R, Pinkert S

Abstract:

Soil contamination is a pressing environmental concern, drawing considerable focus due to its adverse ecological and health outcomes, and the frequent occurrence of contamination incidents in recent years. The interaction between the oil pollutant and the host soil can alter the mechanical properties of the soil in a manner that can crucially affect engineering challenges associated with the stability of soil systems. The geotechnical investigation of contaminated soils has gained momentum since the Gulf War in the 1990s, when a massive amount of oil was spilled into the ocean. Over recent years, various types of soil contaminations have been studied to understand the impact of pollution type, uncovering the mechanical complexity that arises not just from the pollutant type but also from the properties of the host soil and the interplay between them. This complexity is associated with diametrically opposite effects in different soil types. For instance, while certain oils may enhance the frictional properties of cohesive soils, they can reduce the friction in granular soils. This striking difference can be attributed to the different mechanisms at play: physico-chemical interactions predominate in the former case, whereas lubrication effects are more significant in the latter. this study introduces an empirical law designed to quantify the mechanical effect of oil contamination in granular soils, factoring the properties of both the contaminating oil and the host soil. This law is achieved by comprehensive experimental research that spans a wide array of oil types and soils with unique configurations and morphologies. By integrating these diverse data points, our law facilitates accurate predictions of how oil contamination modifies the frictional characteristics of general granular soils.

Keywords: contaminated soils, lubrication, friction, granular media

Procedia PDF Downloads 32
2110 Parallel Hybrid Honeypot and IDS Architecture to Detect Network Attacks

Authors: Hafiz Gulfam Ahmad, Chuangdong Li, Zeeshan Ahmad

Abstract:

In this paper, we proposed a parallel IDS and honeypot based approach to detect and analyze the unknown and known attack taxonomy for improving the IDS performance and protecting the network from intruders. The main theme of our approach is to record and analyze the intruder activities by using both the low and high interaction honeypots. Our architecture aims to achieve the required goals by combing signature based IDS, honeypots and generate the new signatures. The paper describes the basic component, design and implementation of this approach and also demonstrates the effectiveness of this approach reducing the probability of network attacks.

Keywords: network security, intrusion detection, honeypot, snort, nmap

Procedia PDF Downloads 532