Search results for: border security
1388 Scalable Performance Testing: Facilitating The Assessment Of Application Performance Under Substantial Loads And Mitigating The Risk Of System Failures
Authors: Solanki Ravirajsinh
Abstract:
In the software testing life cycle, failing to conduct thorough performance testing can result in significant losses for an organization due to application crashes and improper behavior under high user loads in production. Simulating large volumes of requests, such as 5 million within 5-10 minutes, is challenging without a scalable performance testing framework. Leveraging cloud services to implement a performance testing framework makes it feasible to handle 5-10 million requests in just 5-10 minutes, helping organizations ensure their applications perform reliably under peak conditions. Implementing a scalable performance testing framework using cloud services and tools like JMeter, EC2 instances (Virtual machine), cloud logs (Monitor errors and logs), EFS (File storage system), and security groups offers several key benefits for organizations. Creating performance test framework using this approach helps optimize resource utilization, effective benchmarking, increased reliability, cost savings by resolving performance issues before the application is released. In performance testing, a master-slave framework facilitates distributed testing across multiple EC2 instances to emulate many concurrent users and efficiently handle high loads. The master node orchestrates the test execution by coordinating with multiple slave nodes to distribute the workload. Slave nodes execute the test scripts provided by the master node, with each node handling a portion of the overall user load and generating requests to the target application or service. By leveraging JMeter's master-slave framework in conjunction with cloud services like EC2 instances, EFS, CloudWatch logs, security groups, and command-line tools, organizations can achieve superior scalability and flexibility in their performance testing efforts. In this master-slave framework, JMeter must be installed on both the master and each slave EC2 instance. The master EC2 instance functions as the "brain," while the slave instances operate as the "body parts." The master directs each slave to execute a specified number of requests. Upon completion of the execution, the slave instances transmit their results back to the master. The master then consolidates these results into a comprehensive report detailing metrics such as the number of requests sent, encountered errors, network latency, response times, server capacity, throughput, and bandwidth. Leveraging cloud services, the framework benefits from automatic scaling based on the volume of requests. Notably, integrating cloud services allows organizations to handle more than 5-10 million requests within 5 minutes, depending on the server capacity of the hosted website or application.Keywords: identify crashes of application under heavy load, JMeter with cloud Services, Scalable performance testing, JMeter master and slave using cloud Services
Procedia PDF Downloads 311387 Physical Exam-Indicated Cerclage with Mesh Cap Prolonged Gestation on Average for 9 Weeks and 4 Days: 11 Years of Experience
Authors: M. Keršič, M. Lužnik, J. Lužnik
Abstract:
Cervical dilatation and membrane herniation before 26th week of gestation poses very high risk for extremely and very premature childbirth. Cerclage with mesh cap (mesh cerclage, MC) can greatly diminish this risk and provide additional positive effects. Between 2005 and 2014, MC has been performed in 9 patients with singleton pregnancies who had prolapsed membranes beyond external cervical/uterine os before 25th week of pregnancy (one in 29th). With patients in general anaesthesia, lithotomy and Trendelenburg position (about 25°) prolapsed membranes were repositioned in the uterine cavity, using tampon soaked in antiseptic solution (Skinsept mucosa). A circular, a type of purse-string suture (main band) with double string Ethilon 1 was applied at about 1 to 1.5 cm from the border of the external uterine os - 6 to 8 stitches were placed, so the whole external uterine os was encircled (modified McDonald). In the next step additional Ethilon 0 sutures were placed around all exposed parts of the main double circular suture and loosely tightened. On those sutures, round tailored (diameter around 6 cm) mesh (Prolene® or Gynemesh* PS) was attached. In all 9 cases, gestation was prolonged on average for 9 weeks and 4 days (67 days). In four cases maturity was achieved. Mesh was removed in 37th–38th week of pregnancy or if spontaneous labour began. In two cases, a caesarean section was performed because of breech presentation. In the first week after birth in 22nd week one new born died because of immaturity (premature birth was threatening in 18th week and then MC was placed). Ten years after first MC, 8 of 9 women with singleton pregnancy and MC performed have 8 healthy children from these pregnancies. Mesh cerclage successfully closed the opened cervical canal or uterine orifice and prevented further membrane herniation and membrane rupture. MC also provides a similar effect as with occluding the external os with suturing but without interrupting the way for excretion of abundant cervical mucus. The mesh also pulls the main circular band outwards and thus lowers the chance of suture cutting through the remaining cervix. MC prolonged gestation very successfully (mean for 9 weeks and 4 days) and thus increased possibility for survival and diminished the risk for complications in very early preterm delivered survivors in cases with cervical dilatation and membrane herniation before 26th week of gestation. Without action possibility to achieve at least 28th or 32nd week of gestation would be poor.Keywords: cervical insufficiency, mesh cerclage, membrane protrusion, premature birth prevention, physical exam-indicated cerclage, rescue cerclage
Procedia PDF Downloads 1911386 The Historical Framework of International Crime in International Criminal Law
Authors: Tahraoui Boualem
Abstract:
Researching the historical framework of international crime means examining the historical facts that have contributed to uncovering this serious crime affecting international interests, and the law by which the study of the subject of international crime is determined is international criminal law, which is a branch of public international law. In this context, the historical study of international crime means recognizing the existence of an international community governed by international law, which makes us acknowledge that ancient societies lacked such stable and recurring international relations. Therefore, an attempt to monitor international crime in those ancient societies is only to demonstrate a historical fact that those societies have known some features of this crime, and have contributed in one way or another to the development of international criminal law without defining its concept or legal nature. The international community has affirmed the principle of establishing peace, achieving security, and respecting human rights. As a basis for friendly relations between the people of the international community and in case of prejudice, such as the aggressors breaching the obligations imposed on them, whether in time of peace or war.Keywords: historical framework, of international crime, peace or war., international law
Procedia PDF Downloads 1031385 Trace Network: A Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis
Authors: Jian Xu, Xiaochun Yun, Yongzheng Zhang, Yafei Sang, Zhenyu Cheng
Abstract:
Network attack prevention is a critical research area of information security. Network attack would be oppressed if attribution techniques are capable to trace back to the attackers after the hacking event. Therefore attributing these attacks to a particular identification becomes one of the important tasks when analysts attempt to differentiate and profile the attacker behind a piece of attack trace. To assist analysts in expose attackers behind the scenes, this paper researches on the connections between attribution traces and proposes probabilistic relevance based attribution patterns. This method facilitates the evaluation of the plausibility relevance between different traceable identifications. Furthermore, through analyzing the connections among traces, it could confirm the existence probability of a certain organization as well as discover its affinitive partners by the means of drawing relevance matrix from attribution traces.Keywords: attribution trace, probabilistic relevance, network attack, attacker identification
Procedia PDF Downloads 3691384 Psychosocial Processes and Strategies behind Islamic Deradicalisation: A Scoping Review
Authors: Carvalho M. Catia, Pinto R. Isabel, Azevedo F. Luis, Guerreiro, T. Alexandre, Barbosa R. Mariana, Pinto S. Marta
Abstract:
Due to the loss of territory, foreign terrorist fighters who have joined Islamic State are returning to their home countries. In order to counter this threat to international security, it is important to implement deradicalisation programmes, through strategies and processes that can reverse radicalisation. The objectives of this scoping review - which is underway - are to provide a comprehensive overview of the programmes being implemented, its main characteristics, the main motives and processes leading to deradicalisation, and to identify the key findings and the existing gaps in the literature. The methodology to be implemented in this scoping review follows the guidelines proposed by Arksey and O’Malley and by The Joanna Briggs Institute. The main results will be the development of a synthesis map of the deradicalisation programmes existing in the world, its main features, and recommendations to policy-makers and professionals.Keywords: deradicalisation strategies, psychosocial processes, radicalisation, terrorism
Procedia PDF Downloads 3921383 Hybrid Obfuscation Technique for Reverse Engineering Problem
Authors: Asma’a Mahfoud, Abu Bakar Md. Sultan, Abdul Azim Abd, Norhayati Mohd Ali, Novia Admodisastro
Abstract:
Obfuscation is a practice to make something difficult and complicated. Programming code is ordinarily obfuscated to protect the intellectual property (IP) and prevent the attacker from reverse engineering (RE) a copyrighted software program. Obfuscation may involve encrypting some or all the code, transforming out potentially revealing data, renaming useful classes and variables (identifiers) names to meaningless labels, or adding unused or meaningless code to an application binary. Obfuscation techniques were not performing effectively recently as the reversing tools are able to break the obfuscated code. We propose in this paper a hybrid obfuscation technique that contains three approaches of renaming. Experimentation was conducted to test the effectiveness of the proposed technique. The experimentation has presented a promising result, where the reversing tools were not able to read the code.Keywords: intellectual property, obfuscation, software security, reverse engineering
Procedia PDF Downloads 1501382 The Importance of Fire Safety in Egypt
Authors: Omar Shakra
Abstract:
This paper contains a huge number of benefits that we can use it in several places and times in fire safety protection in the Middle East especially in Egypt . People here in Egypt did not consider the safety and fire protection as important as it is. But on the other hand, its very important for them to contain the fire systems and safety in every facility, the companies , hospitals , police stations , and even the super markets must use the fire system. It makes the facility safe to the visitors while they are using it.From my point of view as the owner Fire Safety Company called Deluge Egypt , i can say that not all of the companies use the fire system protection according to the high cost they prefer to build their company without the protection, and this is make the building totally unsafe to be used from the visitors or client.So, i am looking for new methods and technology to invest in Egypt, and this is through attending this Conference and let the audiences know more about the services i provide and [to let them know about the importance of the Fire Safety in Egypt. The Objectives of my research 1- The system that i used in my Company. 2- The benefits of the Fire System Protection. 3-The importance of the Fire System and safety. 4-The use of the new Technologies. 5-The hardships that i found while having new deals with new clients.Keywords: fire, system, protection, fire hydrants, security, alarms
Procedia PDF Downloads 1131381 Trade in Value Added: The Case of the Central and Eastern European Countries
Authors: Łukasz Ambroziak
Abstract:
Although the impact of the production fragmentation on trade flows has been examined many times since the 1990s, the research was not comprehensive because of the limitations in traditional trade statistics. Early 2010s the complex databases containing world input-output tables (or indicators calculated on their basis) has made available. It increased the possibilities of examining the production sharing in the world. The trade statistic in value-added terms enables us better to estimate trade changes resulted from the internationalisation and globalisation as well as benefits of the countries from international trade. In the literature, there are many research studies on this topic. Unfortunately, trade in value added of the Central and Eastern European Countries (CEECs) has been so far insufficiently studied. Thus, the aim of the paper is to present changes in value added trade of the CEECs (Bulgaria, the Czech Republic, Estonia, Hungary, Latvia, Lithuania, Poland, Romania, Slovakia and Slovenia) in the period of 1995-2011. The concept 'trade in value added' or 'value added trade' is defined as the value added of a country which is directly and indirectly embodied in final consumption of another country. The typical question would be: 'How much value added is created in a country due to final consumption in the other countries?' The data will be downloaded from the World Input-Output Database (WIOD). The structure of this paper is as follows. First, theoretical and methodological aspects related to the application of the input-output tables in the trade analysis will be studied. Second, a brief survey of the empirical literature on this topic will be presented. Third, changes in exports and imports in value added of the CEECs will be analysed. A special attention will be paid to the differences in bilateral trade balances using traditional trade statistics (in gross terms) on one side, and value added statistics on the other. Next, in order to identify factors influencing value added exports and value added imports of the CEECs the generalised gravity model, based on panel data, will be used. The dependent variables will be value added exports and imports. The independent variables will be, among others, the level of GDP of trading partners, the level of GDP per capita of trading partners, the differences in GDP per capita, the level of the FDI inward stock, the geographical distance, the existence (or non-existence) of common border, the membership (or not) in preferential trade agreements or in the EU. For comparison, an estimation will also be made based on exports and imports in gross terms. The initial research results show that the gravity model better explained determinants of trade in value added than gross trade (R2 in the former is higher). The independent variables had the same direction of impact both on value added exports/imports and gross exports/imports. Only value of coefficients differs. The most difference concerned geographical distance. It had smaller impact on trade in value added than gross trade.Keywords: central and eastern European countries, gravity model, input-output tables, trade in value added
Procedia PDF Downloads 2401380 Technology Impact on the Challenge between Human Rights and Cyber Terrorism
Authors: Abanoub Zare Zakaria Herzalla
Abstract:
The link between terrorism and human rights has become a major challenge in the fight against terrorism around the world. This is based on the fact that terrorism and human rights are so closely linked that when the former starts, the latter are violated. This direct connection was recognized in the Vienna Declaration and Program of Action adopted by the World Conference on Human Rights in Vienna on June 25, 1993, which recognizes that acts of terrorism in all their forms and manifestations aim to destroy the human rights of people. Terrorism therefore represents an attack on our most basic human rights. To this end, the first part of this article focuses on the connections between terrorism and human rights and seeks to highlight the interdependence between these two concepts. The second part discusses the emerging concept of cyberterrorism and its manifestations. An analysis of the fight against cyberterrorism in the context of human rights is also carried out.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.
Procedia PDF Downloads 541379 Overview of Wireless Body Area Networks
Authors: Rashi Jain
Abstract:
The Wireless Body Area Networks (WBANs) is an emerging interdisciplinary area where small sensors are placed on/within the human body. These sensors monitor the physiological activities and vital statistics of the body. The data from these sensors is aggregated and communicated to a remote doctor for immediate attention or to a database for records. On 6 Feb 2012, the IEEE 802.15.6 task group approved the standard for Body Area Network (BAN) technologies. The standard proposes the physical and MAC layer for the WBANs. The work provides an introduction to WBANs and overview of the physical and MAC layers of the standard. The physical layer specifications have been covered. A comparison of different protocols used at MAC layer is drawn. An introduction to the network layer and security aspects of the WBANs is made. The WBANs suffer certain limitations such as regulation of frequency bands, minimizing the effect of transmission and reception of electromagnetic signals on the human body, maintaining the energy efficiency among others. This has slowed down their implementation.Keywords: vehicular networks, sensors, MicroController 8085, LTE
Procedia PDF Downloads 2621378 Role of Corporate Social Responsibility in Corporate Governance: Effectiveness of CSR in Human Rights
Authors: Md. Awal Hossain Mollah
Abstract:
Corporate governance is playing a crucial role for ensuring social accountability and responsibility of business organization through Corporate Social Responsibility (CSR) for the last two decades. In Bangladesh, CSR is a growing and popular concept and a recent development. Various business and corporate organizations are playing crucial role for helping vulnerable sections of our society now. For instance, Dutch Bangla Bank has been providing scholarship for under graduate and graduate students in our country which is very helpful for promoting poor and meritorious students in Bangladesh. In this study, how far CSR is playing its role for ensuring human right in Bangladesh will be examined with specific case studies. The study focus will reflect on both developed and developing nations based on literature review and possible empirical evidence.Keywords: CSR, corporate governance, social security, Bangladesh, scholarships, graduate students, Dutch angla Bank
Procedia PDF Downloads 3671377 Nephroprotective Effect of Asparagus falcatus Leaf Extract on Adriamycin Induced Nephrotoxicity in Wistar Rats: A Dose Response Study
Authors: A. M. S. S. Amarasiri, A. P. Attanayake, K. A. P. W. Jayatilaka, L. K. B. Mudduwa
Abstract:
Adriamycin (ADR) is an effective anthracyclin antitumor drug, but its clinical use is limited due to renal toxicity. The leaves of Asparagus falcatus (Family: Liliaceae) have been used in the management of renal diseases since antiquity. In the present investigation, the aqueous leaf extract of A. falcatus was evaluated for acute nephroprotective activity in ADR induced nephrotoxic rats. Nephrotoxicity was induced in healthy male Wistar rats by intraperitoneal administration of ADR 20 mg/kg. The lyophilized powder of the aqueous refluxed (4h) leaf extract of A. falcatus was administered orally at three selected doses; 200, 400 and 600 mg/kg for three consecutive days. Fosinopril sodium (0.09 mg/kg) was used as the standard drug. Administration of the plant extract and the standard drug was commenced 24 hours after the induction of nephrotoxicity to rats. The nephroprotective effect was determined by selected biochemical parameters and by the assessment of histopathology on H and E stained kidney sections. The results were compared to a group of control rats with ADR induced nephrotoxicity. A group of rats administered with the equivalent volume of normal saline served as the healthy control. Administration of ADR 20 mg/kg produced a significant increase in the concentrations of serum creatinine (61%) and urine protein (73%) followed by a significant decrease in serum total protein (21%) and albumin (44%) of the plant extract treated animals compared to the healthy control group (p < 0.05). The aqueous extract of Asparagus falcatus at the three doses; 200, 400 and 600 mg/kg and the standard drug were found to decrease the elevation of concentrations of serum creatinine (33%, 51%, 54% and 42%) and urine protein (8%, 63%, 80% and 86%) respectively. The serum concentrations of total protein (12%, 17%, 29% and 12%) and albumin (3%, 17%, 17% and 16%) were significantly increased compared to the nephrotoxic control group respectively. Assessment of histopathology on H and E stained kidney sections demonstrated that ADR induced renal injury, as evidenced by loss of brush border, cytoplasmic vacuolization, pyknosis in renal tubular epithelial cells, haemorrhages, glomerular congestion and presence of hyaline casts. Treatment with the plant extract and the standard drug resulted in attenuation of the morphological destruction in rats. The results of the present study revealed that the aqueous leaf extract of A. falcatus possesses significant nephroprotective activity against adriamycin induced acute nephrotoxicity. The improved kidney functions were supported with the results of selected biochemical parameters and histological changes observed on H and E stained sections of the kidney tissues in Wistar rats.Keywords: adriamycin induced nephrotoxicity, asparagus falcatus, biochemical assessment, histopathological assessment, nephroprotective activity
Procedia PDF Downloads 1651376 Tamper Resistance Evaluation Tests with Noise Resources
Authors: Masaya Yoshikawa, Toshiya Asai, Ryoma Matsuhisa, Yusuke Nozaki, Kensaku Asahi
Abstract:
Recently, side-channel attacks, which estimate secret keys using side-channel information such as power consumption and compromising emanations of cryptography circuits embedded in hardware, have become a serious problem. In particular, electromagnetic analysis attacks against cryptographic circuits between information processing and electromagnetic fields, which are related to secret keys in cryptography circuits, are the most threatening side-channel attacks. Therefore, it is important to evaluate tamper resistance against electromagnetic analysis attacks for cryptography circuits. The present study performs basic examination of the tamper resistance of cryptography circuits using electromagnetic analysis attacks with noise resources.Keywords: tamper resistance, cryptographic circuit, hardware security evaluation, noise resources
Procedia PDF Downloads 5051375 A Voice Signal Encryption Scheme Based on Chaotic Theory
Authors: Hailang Yang
Abstract:
To ensure the confidentiality and integrity of speech signals in communication transmission, this paper proposes a voice signal encryption scheme based on chaotic theory. Firstly, the scheme utilizes chaotic mapping to generate a key stream and then employs the key stream to perform bitwise exclusive OR (XOR) operations for encrypting the speech signal. Additionally, the scheme utilizes a chaotic hash function to generate a Message Authentication Code (MAC), which is appended to the encrypted data to verify the integrity of the data. Subsequently, we analyze the security performance and encryption efficiency of the scheme, comparing and optimizing it against existing solutions. Finally, experimental results demonstrate that the proposed scheme can resist common attacks, achieving high-quality encryption and speed.Keywords: chaotic theory, XOR encryption, chaotic hash function, Message Authentication Code (MAC)
Procedia PDF Downloads 531374 A Pre-Assessment Questionnaire to Identify Healthcare Professionals’ Perception on Information Technology Implementation
Authors: Y. Atilgan Şengül
Abstract:
Health information technologies promise higher quality, safer care and much more for both patients and professionals. Despite their promise, they are costly to develop and difficult to implement. On the other hand, user acceptance and usage determine the success of implemented information technology in healthcare. This study provides a model to understand health professionals’ perception and expectation of health information technology. Extensive literature review has been conducted to determine the main factors to be measured. A questionnaire has been designed as a measurement model and submitted to the personnel of an in vitro fertilization clinic. The respondents’ degree of agreement according to five-point Likert scale was 72% for convenient access to data and 69.4% for the importance of data security. There was a significant difference in acceptance of electronic data storage for female respondents. Also, other significant differences between professions were obtained.Keywords: healthcare, health informatics, medical record system, questionnaire
Procedia PDF Downloads 1751373 Human Rights Impact on Citizens Evolution
Authors: Joseph Marzouk Gerais Abdelmalak
Abstract:
The interface between development and human rights has long been the subject of academic debate. Therefore, to understand the dynamics between the two concepts, a number of principles have been adopted, ranging from the right to development to a human rights-based approach to development. Despite these attempts, the exact connection between development and human rights is not yet fully understood. However, the inherent interdependence between these two concepts and the idea that development efforts should be undertaken with respect for human rights guarantees have gained momentum in recent years. It will then be examined whether the right to sustainable development is recognized.The article therefore concludes that the principles of sustainable development are recognized, directly or indirectly, in various human rights instruments, which represents a positive answer to the question posed above. Therefore, this work discusses international and regional human rights instruments as well as case law and interpretative guidelines from human rights bodies to demonstrate this hypothesis.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security
Procedia PDF Downloads 771372 Co-Seismic Deformation Using InSAR Sentinel-1A: Case Study of the 6.5 Mw Pidie Jaya, Aceh, Earthquake
Authors: Jefriza, Habibah Lateh, Saumi Syahreza
Abstract:
The 2016 Mw 6.5 Pidie Jaya earthquake is one of the biggest disasters that has occurred in Aceh within the last five years. This earthquake has caused severe damage to many infrastructures such as schools, hospitals, mosques, and houses in the district of Pidie Jaya and surrounding areas. Earthquakes commonly occur in Aceh Province due to the Aceh-Sumatra is located in the convergent boundaries of the Sunda Plate subducted beneath the Indo-Australian Plate. This convergence is responsible for the intensification of seismicity in this region. The plates are tilted at a speed of 63 mm per year and the right lateral component is accommodated by strike- slip faulting within Sumatra, mainly along the great Sumatran fault. This paper presents preliminary findings of InSAR study aimed at investigating the co-seismic surface deformation pattern in Pidie Jaya, Aceh-Indonesia. Coseismic surface deformation is rapid displacement that occurs at the time of an earthquake. Coseismic displacement mapping is required to study the behavior of seismic faults. InSAR is a powerful tool for measuring Earth surface deformation to a precision of a few centimetres. In this study, two radar images of the same area but at two different times are required to detect changes in the Earth’s surface. The ascending and descending Sentinel-1A (S1A) synthetic aperture radar (SAR) data and Sentinels application platform (SNAP) toolbox were used to generate SAR interferogram image. In order to visualize the InSAR interferometric, the S1A from both master (26 Nov 2016) and slave data-sets (26 Dec 2016) were utilized as the main data source for mapping the coseismic surface deformation. The results show that the fringes of phase difference have appeared in the border region as a result of the movement that was detected with interferometric technique. On the other hand, the dominant fringes pattern also appears near the coastal area, this is consistent with the field investigations two days after the earthquake. However, the study has also limitations of resolution and atmospheric artefacts in SAR interferograms. The atmospheric artefacts are caused by changes in the atmospheric refractive index of the medium, as a result, has limitation to produce coherence image. Low coherence will be affected the result in creating fringes (movement can be detected by fringes). The spatial resolution of the Sentinel satellite has not been sufficient for studying land surface deformation in this area. Further studies will also be investigated using both ALOS and TerraSAR-X. ALOS and TerraSAR-X improved the spatial resolution of SAR satellite.Keywords: earthquake, InSAR, interferometric, Sentinel-1A
Procedia PDF Downloads 1971371 Determining of Importance Level of Factors Affecting Job Selection with the Method of AHP
Authors: Nurullah Ekmekci, Ömer Akkaya, Kazım Karaboğa, Mahmut Tekin
Abstract:
Job selection is one of the most important decisions that affect their lives in the name of being more useful to themselves and the society. There are many criteria to consider in the job selection. The amount of criteria in the job selection makes it a multi-criteria decision-making (MCDM) problem. In this study; job selection has been discussed as multi-criteria decision-making problem and has been solved by Analytic Hierarchy Process (AHP), one of the multi-criteria decision making methods. A survey, contains 5 different job selection criteria (finding a job friendliness, salary status, job , social security, work in the community deems reputation and business of the degree of difficulty) within many job selection criteria and 4 different job alternative (being academician, working at the civil service, working at the private sector and working at in their own business), has been conducted to the students of Selcuk University Faculty of Economics and Administrative Sciences. As a result of pairwise comparisons, the highest weighted criteria in the job selection and the most coveted job preferences were identified.Keywords: analytical hierarchy process, job selection, multi-criteria, decision making
Procedia PDF Downloads 4031370 A Framework for Protecting Teenagers from Cyber Crimes and Cyberbullying
Authors: Sultan Alanazi, Adwan Alanazi
Abstract:
Social applications consist of powerful tools that allow people to connect and interact with each other. However, its negative use cannot be ignored. Cyberbullying is a new and serious Internet problem. Cyberbullying is one of the most common risks for teenagers to go online. More than half of young people report that they do not tell their parents when this will occur, which can have significant physiological consequences. Cyberbullying involves the deliberate use of digital media on the Internet to convey false or embarrassing information about others. Therefore, this article provides a way to detect cyber-bullying in social media applications for parents. The purpose of our work is to develop an architectural model for identifying and measuring the state of Cyberbullying faced by children on social media applications. For parents, this will be a good tool for monitoring their children without invading their privacy. Finally, some interesting open-ended questions were raised, suggesting promising ideas for starting new research in this new field.Keywords: cyberbullying, cyber bullying, internet crimes, social media security, E-crimes
Procedia PDF Downloads 1431369 Political Determinants of Sovereign Spread: The Great East-West Divide
Authors: Maruska Vizek, Josip Glaurdic, Marina Tkalec, Goran Vuksic
Abstract:
We empirically explore whether and how taxation affects bilateral real exchange rates in the euro area – relative unit labor costs and relative consumer price indices. We find that employers’ social security contributions and the value added tax changes have the expected effects put forward in the fiscal devaluation literature and simulations. Increases in employers’ contributions appreciate the relative unit labor costs in the short- and the long-run, while value added tax hike appreciates the relative consumer prices. Somewhat surprisingly, for personal income tax increases, we find a short-run depreciating impact on the relative unit labor costs, while increases in employees’ contributions depreciate both measures of real exchange rates in the short-run.Keywords: sovereign bonds, European Union, developing countries, political determinants
Procedia PDF Downloads 3141368 The Impact of Artificial Intelligence on Human Rights Legislations and Evolution
Authors: Shenouda Farag Aziz Ibrahim
Abstract:
The relationship between terrorism and human rights has become an important issue in the fight against terrorism worldwide. This is based on the fact that terrorism and human rights are closely linked, so that when the former begins, the latter suffers. This direct link was recognized in the Vienna Declaration and Program of Action adopted by the International Conference on Human Rights held in Vienna on 25 June 1993, which recognized that terrorist acts aim to violate human rights in all their forms and manifestations. . Therefore, terrorism represents an attack on fundamental human rights. For this purpose, the first part of this article focuses on the relationship between terrorism and human rights and aims to show the relationship between these two concepts. In the second part, the concept of cyber threat and its manifestations are discussed. An analysis of the fight against terrorism in the context of human rights was also made..Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.
Procedia PDF Downloads 451367 Sustainable Agriculture in Nigeria: Integrating Energy Efficiency and Renewables
Authors: Vicx Farm
Abstract:
This paper examines the critical role of energy efficiency management and renewable energy in fostering sustainable agricultural practices in Nigeria. With the growing concerns over energy security, environmental degradation, and climate change, there is an urgent need to transition towards more sustainable energy sources and practices in the agricultural sector. Nigeria, being a significant player in the global agricultural market, stands to benefit immensely from integrating energy efficiency measures and renewable energy solutions into its agricultural activities. This paper discusses the current energy challenges facing Nigerian agriculture, explores the potential benefits of energy efficiency and renewable energy adoption, and proposes strategies for effective implementation. The paper concludes with recommendations for policymakers, stakeholders, and practitioners to accelerate the adoption of energy-efficient and renewable energy technologies in Nigerian agriculture, thereby promoting sustainable development and resilience in the sector.Keywords: energy, agriculture, sustainability, power
Procedia PDF Downloads 771366 A Secure Routing Algorithm for Underwater Wireless Sensor Networks
Authors: Seyed Mahdi Jameii
Abstract:
Underwater wireless sensor networks have been attracting the interest of many researchers lately, and the past three decades have beheld the rapid progress of underwater acoustic communication. One of the major problems in underwater wireless sensor networks is how to transfer data from the moving node to the base stations and choose the optimized route for data transmission. Secure routing in underwater wireless sensor network (UWCNs) is necessary for packet delivery. Some routing protocols are proposed for underwater wireless sensor networks. However, a few researches have been done on secure routing in underwater sensor networks. In this article, a secure routing protocol is provided to resist against wormhole and sybil attacks. The results indicated acceptable performance in terms of increasing the packet delivery ratio with regards to the attacks, increasing network lifetime by creating balance in the network energy consumption, high detection rates against the attacks, and low-end to end delay.Keywords: attacks, routing, security, underwater wireless sensor networks
Procedia PDF Downloads 4201365 Evaluation of the Sterilization Practice in Liberal Dental Surgeons at Sidi Bel Abbes- Algeria
Authors: A. Chenafa, S. Boulenouar, M. Zitouni, M. Boukouria
Abstract:
The sterilization of medical devices constitutes for all the medical professions, an inescapable obligation. It has for objective to prevent the infectious risk, both for the patient and for the medical team. The Dental surgeon as every healthcare professional has to master perfectly this subject and to train his staff to the various techniques of sterilization. It is the only way to assure the patients all the security for which they are entitled to wait when they undergo a dental care. It’s for it, that we undertook to lead an investigation aiming at estimating the sterilization practice at the dental surgeon of Sidi bel Abbes. The survey result showed a youth marked with the profession with a majority use of autoclave with cycle B and an almost total absence of the sterilization controls (test of Bowie and Dick). However, the majority of the dentists control and validate their sterilizers. Finally, our survey allowed us to describe some practices which must be improved regarding control, regarding qualification and regarding staff training. And suggestions were made in this sense.Keywords: dental surgeon, medical devices, sterilization, survey
Procedia PDF Downloads 4041364 Community Perception towards the Major Drivers for Deforestation and Land Degradation of Choke Afro-alpine and Sub-afro alpine Ecosystem, Northwest Ethiopia
Authors: Zelalem Teshager
Abstract:
The Choke Mountains have several endangered and endemic wildlife species and provide important ecosystem services. Despite their environmental importance, the Choke Mountains are found in dangerous conditions. This raised the need for an evaluation of the community's perception of deforestation and its major drivers and suggested possible solutions in the Choke Mountains of northwestern Ethiopia. For this purpose, household surveys, key informant interviews, and focus group discussions were used. A total sample of 102 informants was used for this survey. A purposive sampling technique was applied to select the participants for in-depth interviews and focus group discussions. Both qualitative and quantitative data analyses were used. Computation of descriptive statistics such as mean, percentages, frequency, tables, figures, and graphs was applied to organize, analyze, and interpret the study. This study assessed smallholder agricultural land expansion, Fuel wood collection, population growth; encroachment, free grazing, high demand of construction wood, unplanned resettlement, unemployment, border conflict, lack of a strong forest protecting system, and drought were the serious causes of forest depletion reported by local communities. Loss of land productivity, Soil erosion, soil fertility decline, increasing wind velocity, rising temperature, and frequency of drought were the most perceived impacts of deforestation. Most of the farmers have a holistic understanding of forest cover change. Strengthening forest protection, improving soil and water conservation, enrichment planting, awareness creation, payment for ecosystem services, and zero grazing campaigns were mentioned as possible solutions to the current state of deforestation. Applications of Intervention measures, such as animal fattening, beekeeping, and fruit production can contribute to decreasing the deforestation causes and improve communities’ livelihood. In addition, concerted efforts of conservation will ensure that the forests’ ecosystems contribute to increased ecosystem services. The major drivers of deforestation should be addressed with government intervention to change dependency on forest resources, income sources of the people, and institutional set-up of the forestry sector. Overall, further reduction in anthropogenic pressure is urgent and crucial for the recovery of the afro-alpine vegetation and the interrelated endangered wildlife in the Choke Mountains.Keywords: choke afro-alpine, deforestation, drivers, intervention measures, perceptions
Procedia PDF Downloads 561363 Autonomic Threat Avoidance and Self-Healing in Database Management System
Authors: Wajahat Munir, Muhammad Haseeb, Adeel Anjum, Basit Raza, Ahmad Kamran Malik
Abstract:
Databases are the key components of the software systems. Due to the exponential growth of data, it is the concern that the data should be accurate and available. The data in databases is vulnerable to internal and external threats, especially when it contains sensitive data like medical or military applications. Whenever the data is changed by malicious intent, data analysis result may lead to disastrous decisions. Autonomic self-healing is molded toward computer system after inspiring from the autonomic system of human body. In order to guarantee the accuracy and availability of data, we propose a technique which on a priority basis, tries to avoid any malicious transaction from execution and in case a malicious transaction affects the system, it heals the system in an isolated mode in such a way that the availability of system would not be compromised. Using this autonomic system, the management cost and time of DBAs can be minimized. In the end, we test our model and present the findings.Keywords: autonomic computing, self-healing, threat avoidance, security
Procedia PDF Downloads 5071362 Using Multi-Level Analysis to Identify Future Trends in Small Device Digital Communication Examinations
Authors: Mark A. Spooner
Abstract:
The growth of technological advances in the digital communications industry has dictated the way forensic examination laboratories receive, analyze, and report on digital evidence. This study looks at the trends in a medium sized digital forensics lab that examines small communications devices (i.e., cellular telephones, tablets, thumb drives, etc.) over the past five years. As law enforcement and homeland security organizations budgets shrink, many agencies are being asked to perform more examinations with less resources available. Using multi-level statistical analysis using five years of examination data, this research shows the increasing technological demand trend. The research then extrapolates the current data into the model created and finds a continued exponential growth curve of said demands is well within the parameters defined earlier on in the research.Keywords: digital forensics, forensic examination, small device, trends
Procedia PDF Downloads 2011361 Epididymis in the Agouti (Dasyprocta azarae): Light Microscope Study
Authors: Bruno C. Schimming, Leandro L. Martins, PatríCia F. F. Pinheiro, Raquel F. Domeniconi, FabríCio S. Oliveira
Abstract:
The agouti is a wildlife rodent that can be used as an alternative source of animal protein and this species has been raised in captivity in Brazil with the aim of providing meat. Thus, the knowledge of their reproductive biology and morphology of the reproductive organs is important. The objective of this study was to describe the morphology of epididymis in the Azara’s agouti, by light microscopy. Samples of epididymis were obtained from five adult Azara’s agouti (Dasyprocta azarae) during castration surgery performed at the Municipal Zoo of Catanduva, Brazil. Fragments of the epididymal regions (initial segment, caput, corpus and cauda) were collected. The biological samples were immediately fixed in paraformaldehyde for 24 hours, followed by histologic procedures comprising embedding in ParaplastTM (Sigma, St. Louis, MO, USA), sections of 5 µm, and staining with HE and Masson’s trichrome. The epididymis was a highly convoluted tubule that links the testis to the vas deferens. The epithelium lining was pseudostratified columnar surrounded by a periductal stroma. The epithelium contains several cell types: principal, basal, apical, clear, and hallo cells. Principal cells were the most abundant cell type. There were observed also migratory cells named halo cells. The caput epididymis was divided into two different regions: initial segment and caput. The initial segment has a very wide lumen, a high epithelium with conspicuous microvilli and the lumen was wide with exfoliated material. The other region of the caput epididymis, showed a lower epithelium when compared with the initial segment, large amounts of spermatozoa in the lumen, and a cytoplasmic vacuolization. This region presented many narrows cells. Many spermatozoa appeared in the lumen of corpus epididymis. The cauda region had a lower epithelium than the other epididymal regions in the agouti. The cauda epithelium presented plicae protruding into the lumen. Large amounts of spermatozoa are also present in the lumen. Small microvilli uniformly arranged so as to form a kind of “brush border” are observed on the apical surface of the cauda epithelium. The pattern of the epithelium lining the duct of the agouti epididymis does not differ greatly from that reported to other mammals, such as domestic and wildlife animals. These findings can cooperate with future investigations especially those related to rational exploration of these animals. All experimental procedures were approved by the institutional ethics committee (CEUA 796/2015). This study was supported by FAPESP (Grants 2015/23822-1).Keywords: wildlife, testis excurrent ducts, epididymis, morphology
Procedia PDF Downloads 2401360 Zero-Knowledge Proof-of-Reserve: A Confidential Approach to Cryptocurrency Asset Verification
Authors: Sam Ng, Lewis Leighton, Sam Atkinson, Carson Yan, Landan Hu, Leslie Cheung, Brian Yap, Kent Lung, Ketat Sarakune
Abstract:
This paper introduces a method for verifying cryptocurrency reserves that balances the need for both transparency and data confidentiality. Our methodology employs cryptographic techniques, including Merkle Trees, Bulletproof, and zkSnark, to verify that total assets equal or exceed total liabilities, represented by customer funds. Importantly, this verification is achieved without disclosing sensitive information such as the total asset value, customer count, or cold wallet addresses. We delve into the construction and implementation of this methodology. While the system is robust and scalable, we also identify areas for potential enhancements to improve its efficiency and versatility. As the digital asset landscape continues to evolve, our approach provides a solid foundation for ensuring continued trust and security in digital asset platforms.Keywords: cryptocurrency, crypto-currency, proof-of-reserve, por, zero-knowledge, ZKP
Procedia PDF Downloads 751359 Understanding the Safety Impacts of Imbalances in Truck Parking Supply and Demand
Authors: Rahil Saeedi
Abstract:
The imbalance in truck parking supply and demand can create important safety issues for truck drivers and the public. Research has shown that breaks at specific intervals can increase drivers’ alertness by reducing the monotony of the task. However, if fatigued truck drivers are unable to find a safe parking spot for rest, they may continue to drive or choose to park at remote and insecure areas or undesignated locations. All of these situations pose serious safety and security risks to truck drivers and other roadway users. This study uses 5-year truck crash data in Ohio to develop and test a framework for identifying crashes that happen as a result of imbalances in truck parking supply and demand. The societal impacts of these crashes are then interpreted as monetary values, calculated using the costs associated with various crash severity levels.Keywords: truck parking, road safety, crash data, geofencing, driver fatigue, undesignated parking
Procedia PDF Downloads 168