Search results for: border cyber-security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 512

Search results for: border cyber-security

302 Demographic Component Role in Rural Development in the Region of Bucovina

Authors: Morar (Bumbu) Nicoleta Ileana

Abstract:

Located in the northeastern part of Romania in a cross-border area, Bucovina region, due to historical events that took place here, is characterized by the cohabitation in the same area of a significant number of ethnic communities, represented in 54% by rural population. In addition to providing the natural, economic history and decision makers, the demographic component is responsible for the region's development trajectory to which it belongs. The influence that people exert on rural development is shown by the values of the different demographic indicator. This study will analyze the demographic indicators obtained against a strong database, emphasizing the indicators that favor the rural development of the region and those that prevent it. The study is useful in defining the rightful directions that rural economic development can focus on, also representing an important tool in developing strategies for the development of rural settlements of Bucovina region.

Keywords: Bucovina, development directions, demographic indicators, rural development

Procedia PDF Downloads 292
301 Framework for Assessment of Non-financial Concentration Risk

Authors: Anchal Gupta

Abstract:

Amid the escalating digitalization and deployment of cross-border technological solutions, a significant portion of the industry and regulatory bodies have begun to pose queries concerning the formulation, computation, and contemplation of concentration risk. In the financial sector, well-established parameters exist for gauging the concentration of a portfolio and similar elements. However, a unified framework appears to be absent, which could guide industry and regulators pertaining to non-financial concentration risk. This paper introduces a framework, constructed on the foundation of multiple regulations where regulators are advocating for licensed corporations to evaluate their concentration risk. The lacuna lies in the fact that, while regulators delineate what constitutes concentration risk, unlike other domains, no guidelines are provided that could assist firms. This frequently results in ambiguity and individual corporate interpretation, which, from a risk management standpoint, is less than ideal.

Keywords: concentration risk, non-financial risk, government regulation, financial regulation, non-market risk, MAS, DORA, EDSP, SFC

Procedia PDF Downloads 26
300 Mathematical Modeling and Algorithms for the Capacitated Facility Location and Allocation Problem with Emission Restriction

Authors: Sagar Hedaoo, Fazle Baki, Ahmed Azab

Abstract:

In supply chain management, network design for scalable manufacturing facilities is an emerging field of research. Facility location allocation assigns facilities to customers to optimize the overall cost of the supply chain. To further optimize the costs, capacities of these facilities can be changed in accordance with customer demands. A mathematical model is formulated to fully express the problem at hand and to solve small-to-mid range instances. A dedicated constraint has been developed to restrict emissions in line with the Kyoto protocol. This problem is NP-Hard; hence, a simulated annealing metaheuristic has been developed to solve larger instances. A case study on the USA-Canada cross border crossing is used.

Keywords: emission, mixed integer linear programming, metaheuristic, simulated annealing

Procedia PDF Downloads 301
299 Influence of Glass Plates Different Boundary Conditions on Human Impact Resistance

Authors: Alberto Sanchidrián, José A. Parra, Jesús Alonso, Julián Pecharromán, Antonia Pacios, Consuelo Huerta

Abstract:

Glass is a commonly used material in building; there is not a unique design solution as plates with a different number of layers and interlayers may be used. In most façades, a security glazing have to be used according to its performance in the impact pendulum. The European Standard EN 12600 establishes an impact test procedure for classification under the point of view of the human security, of flat plates with different thickness, using a pendulum of two tires and 50 kg mass that impacts against the plate from different heights. However, this test does not replicate the actual dimensions and border conditions used in building configurations and so the real stress distribution is not determined with this test. The influence of different boundary conditions, as the ones employed in construction sites, is not well taking into account when testing the behaviour of safety glazing and there is not a detailed procedure and criteria to determinate the glass resistance against human impact. To reproduce the actual boundary conditions on site, when needed, the pendulum test is arranged to be used "in situ", with no account for load control, stiffness, and without a standard procedure. Fracture stress of small and large glass plates fit a Weibull distribution with quite a big dispersion so conservative values are adopted for admissible fracture stress under static loads. In fact, test performed for human impact gives a fracture strength two or three times higher, and many times without a total fracture of the glass plate. Newest standards, as for example DIN 18008-4, states for an admissible fracture stress 2.5 times higher than the ones used for static and wing loads. Now two working areas are open: a) to define a standard for the ‘in situ’ test; b) to prepare a laboratory procedure that allows testing with more real stress distribution. To work on both research lines a laboratory that allows to test medium size specimens with different border conditions, has been developed. A special steel frame allows reproducing the stiffness of the glass support substructure, including a rigid condition used as reference. The dynamic behaviour of the glass plate and its support substructure have been characterized with finite elements models updated with modal tests results. In addition, a new portable impact machine is being used to get enough force and direction control during the impact test. Impact based on 100 J is used. To avoid problems with broken glass plates, the test have been done using an aluminium plate of 1000 mm x 700 mm size and 10 mm thickness supported on four sides; three different substructure stiffness conditions are used. A detailed control of the dynamic stiffness and the behaviour of the plate is done with modal tests. Repeatability of the test and reproducibility of results prove that procedure to control both, stiffness of the plate and the impact level, is necessary.

Keywords: glass plates, human impact test, modal test, plate boundary conditions

Procedia PDF Downloads 303
298 From an Expectations Crisis to a Mental Disorder: The Consequences of Irregular Journeys on Sub-Saharan Migrants

Authors: Siham Soulaimi

Abstract:

Europe has become a difficult destination due to strict migration policies and border controls, making Morocco an immigration country. Morocco is currently at the center of the international migration debate because it not only hosts regular migrants but also must deal with the problem of irregular migrants entering its territory. Sub-Saharan irregular migration is full of challenges that might cause a delay for the migrants, announcing a death sentence for many others. The journey's hurdles are likely to cause a crisis in expectations, resulting in serious consequences on the migrants' mental health. Our research study emphasizes that sub-Saharan migrants begin irregular journeys with high hopes, only to be disappointed by how unexpectedly cruel it turns out to be. We also pointed to specific physical and, more crucially, mental health problems that they end up with after survival, resulting in somatic disorders.

Keywords: irregular migration, Sub-Saharan migrants, challenges, experiences crisis, mental health, somatoform disorder

Procedia PDF Downloads 124
297 Endocardial Ultrasound Segmentation using Level Set method

Authors: Daoudi Abdelaziz, Mahmoudi Saïd, Chikh Mohamed Amine

Abstract:

This paper presents a fully automatic segmentation method of the left ventricle at End Systolic (ES) and End Diastolic (ED) in the ultrasound images by means of an implicit deformable model (level set) based on Geodesic Active Contour model. A pre-processing Gaussian smoothing stage is applied to the image, which is essential for a good segmentation. Before the segmentation phase, we locate automatically the area of the left ventricle by using a detection approach based on the Hough Transform method. Consequently, the result obtained is used to automate the initialization of the level set model. This initial curve (zero level set) deforms to search the Endocardial border in the image. On the other hand, quantitative evaluation was performed on a data set composed of 15 subjects with a comparison to ground truth (manual segmentation).

Keywords: level set method, transform Hough, Gaussian smoothing, left ventricle, ultrasound images.

Procedia PDF Downloads 460
296 The Use of Emerging Technologies in Higher Education Institutions: A Case of Nelson Mandela University, South Africa

Authors: Ayanda P. Deliwe, Storm B. Watson

Abstract:

The COVID-19 pandemic has disrupted the established practices of higher education institutions (HEIs). Most higher education institutions worldwide had to shift from traditional face-to-face to online learning. The online environment and new online tools are disrupting the way in which higher education is presented. Furthermore, the structures of higher education institutions have been impacted by rapid advancements in information and communication technologies. Emerging technologies should not be viewed in a negative light because, as opposed to the traditional curriculum that worked to create productive and efficient researchers, emerging technologies encourage creativity and innovation. Therefore, using technology together with traditional means will enhance teaching and learning. Emerging technologies in higher education not only change the experience of students, lecturers, and the content, but it is also influencing the attraction and retention of students. Higher education institutions are under immense pressure because not only are they competing locally and nationally, but emerging technologies also expand the competition internationally. Emerging technologies have eliminated border barriers, allowing students to study in the country of their choice regardless of where they are in the world. Higher education institutions are becoming indifferent as technology is finding its way into the lecture room day by day. Academics need to utilise technology at their disposal if they want to get through to their students. Academics are now competing for students' attention with social media platforms such as WhatsApp, Snapchat, Instagram, Facebook, TikTok, and others. This is posing a significant challenge to higher education institutions. It is, therefore, critical to pay attention to emerging technologies in order to see how they can be incorporated into the classroom in order to improve educational quality while remaining relevant in the work industry. This study aims to understand how emerging technologies have been utilised at Nelson Mandela University in presenting teaching and learning activities since April 2020. The primary objective of this study is to analyse how academics are incorporating emerging technologies in their teaching and learning activities. This primary objective was achieved by conducting a literature review on clarifying and conceptualising the emerging technologies being utilised by higher education institutions, reviewing and analysing the use of emerging technologies, and will further be investigated through an empirical analysis of the use of emerging technologies at Nelson Mandela University. Findings from the literature review revealed that emerging technology is impacting several key areas in higher education institutions, such as the attraction and retention of students, enhancement of teaching and learning, increase in global competition, elimination of border barriers, and highlighting the digital divide. The literature review further identified that learning management systems, open educational resources, learning analytics, and artificial intelligence are the most prevalent emerging technologies being used in higher education institutions. The identified emerging technologies will be further analysed through an empirical analysis to identify how they are being utilised at Nelson Mandela University.

Keywords: artificial intelligence, emerging technologies, learning analytics, learner management systems, open educational resources

Procedia PDF Downloads 65
295 Investigating Seasonal Changes of Urban Land Cover with High Spatio-Temporal Resolution Satellite Data via Image Fusion

Authors: Hantian Wu, Bo Huang, Yuan Zeng

Abstract:

Divisions between wealthy and poor, private and public landscapes are propagated by the increasing economic inequality of cities. While these are the spatial reflections of larger social issues and problems, urban design can at least employ spatial techniques that promote more inclusive rather than exclusive, overlapping rather than segregated, interlinked rather than disconnected landscapes. Indeed, the type of edge or border between urban landscapes plays a critical role in the way the environment is perceived. China experiences rapid urbanization, which poses unpredictable environmental challenges. The urban green cover and water body are under changes, which highly relevant to resident wealth and happiness. However, very limited knowledge and data on their rapid changes are available. In this regard, enhancing the monitoring of urban landscape with high-frequency method, evaluating and estimating the impacts of the urban landscape changes, and understating the driving forces of urban landscape changes can be a significant contribution for urban planning and studying. High-resolution remote sensing data has been widely applied to urban management in China. The map of urban land use map for the entire China of 2018 with 10 meters resolution has been published. However, this research focuses on the large-scale and high-resolution remote sensing land use but does not precisely focus on the seasonal change of urban covers. High-resolution remote sensing data has a long-operation cycle (e.g., Landsat 8 required 16 days for the same location), which is unable to satisfy the requirement of monitoring urban-landscape changes. On the other hand, aerial-remote or unmanned aerial vehicle (UAV) sensing are limited by the aviation-regulation and cost was hardly widely applied in the mega-cities. Moreover, those data are limited by the climate and weather conditions (e.g., cloud, fog), and those problems make capturing spatial and temporal dynamics is always a challenge for the remote sensing community. Particularly, during the rainy season, no data are available even for Sentinel Satellite data with 5 days interval. Many natural events and/or human activities drive the changes of urban covers. In this case, enhancing the monitoring of urban landscape with high-frequency method, evaluating and estimating the impacts of the urban landscape changes, and understanding the mechanism of urban landscape changes can be a significant contribution for urban planning and studying. This project aims to use the high spatiotemporal fusion of remote sensing data to create short-cycle, high-resolution remote sensing data sets for exploring the high-frequently urban cover changes. This research will enhance the long-term monitoring applicability of high spatiotemporal fusion of remote sensing data for the urban landscape for optimizing the urban management of landscape border to promoting the inclusive of the urban landscape to all communities.

Keywords: urban land cover changes, remote sensing, high spatiotemporal fusion, urban management

Procedia PDF Downloads 119
294 Yield Loss in Maize Due to Stem Borers and Their Integrated Management

Authors: C. P. Mallapur, U. K. Hulihalli, D. N. Kambrekar

Abstract:

Maize (Zea mays L.) an important cereal crop in the world has diversified uses including human consumption, animal feed, and industrial uses. A major constraint in low productivity of maize in India is undoubtedly insect pests particularly two species of stem borers, Chilo partellus (Swinhoe) and Sesamia inferens (Walker). The stem borers cause varying level of yield losses in different agro-climate regions (25.7 to 80.4%) resulting in a huge economic loss to the farmers. Although these pests are rather difficult to manage, efforts have been made to combat the menace by using effective insecticides. However, efforts have been made in the present study to integrate various possible approaches for sustainable management of these borers. Two field experiments were conducted separately during 2016-17 at Main Agricultural Research Station, University of Agricultural Sciences, Dharwad, Karnataka, India. In the first experiment, six treatments were randomized in RBD. The insect eggs at pinhead stage (@ 40 eggs/plant) were stapled to the under surface of leaves covering 15-20 % of plants in each plot after 15 days of sowing. The second experiment was planned with nine treatments replicated thrice. The border crop with NB -21 grass was planted all around the plots in the specific treatments while, cowpea intercrop (@6:1-row proportion) was sown along with the main crop and later, the insecticidal spray with chlorantraniliprole and nimbecidine was taken upon need basis in the specific treatments. The results indicated that the leaf injury and dead heart incidence were relatively more in the treatments T₂ and T₄ wherein, no insect control measures were made after the insect release (58.30 & 40.0 % leaf injury and 33.42 and 25.74% dead heart). On the contrary, these treatments recorded higher stem tunneling (32.4 and 24.8%) and resulted in lower grain yield (17.49 and 26.79 q/ha) compared to 29.04, 32.68, 40.93 and 46.38 q/ha recorded in T₁, T₃, T₅ and T₆ treatments, respectively. A maximum yield loss of 28.89 percent was noticed in T₂ followed by 19.59 percent in T₄ where no sprays were imposed. The data on integrated management trial revealed the lowest stem borer damage (19.28% leaf injury and 1.21% dead heart) in T₅ (seed treatment with thiamethoxam 70FS @ 8ml/kg seed + cow intercrop along with nimbecidine 0.03EC @ 5.0 ml/l and chlorantraniliprole 18.5SC spray @ 0.2 ml/l). The next best treatment was T₆ (ST+ NB-21 borer with nimbecidine and chlorantraniliprole spray) with 21.3 and 1.99 percent leaf injury and dead heart incidence, respectively. These treatments resulted in highest grain yield (77.71 and 75.53 q/ha in T₅ and T₆, respectively) compared to the standard check, T₁ (ST+ chlorantraniliprole spray) wherein, 27.63 percent leaf injury and 3.68 percent dead heart were noticed with 60.14 q/ha grain yield. The stem borers can cause yield loss up to 25-30 percent in maize which can be well tackled by seed treatment with thiamethoxam 70FS @ 8ml/kg seed and sowing the crop along with cowpea as intercrop (6:1 row proportion) or NB-21 grass as border crop followed by application of nimbecidine 0.03EC @ 5.0 ml/l and chlorantraniliprole 18.5SC @ 0.2 ml/l on need basis.

Keywords: Maize stem borers, Chilo partellus, Sesamia inferens, crop loss, integrated management

Procedia PDF Downloads 171
293 The Russian-Ukrainian Conflict: An Imperial, Neoliberal Limbo

Authors: Anna Savchenko

Abstract:

The dissolution of the Soviet Union brought about a wave of decolonisation throughout the Soviet space in the 1990s. While this emancipation ushered in an era of reform in the newly independent states, it also opened up the opportunity for countries such as Ukraine to be (re)colonised by a different ruling power: the European Union. Ukraine’s relationship with the EU has been further complicated by the fact that the country’s political leadership has aligned itself with a Western agenda of democratisation. This article challenges the neoliberal belief that the global market can spurn democratisation by analysing the way in which market privatisation in Ukraine has allowed for mass corruption to flourish. I submit that neoliberalism, or the sheer force of the global market, is just as colonising as modern-day imperialism has proven to be by providing an analytical synthesis of Russia and Ukraine’s century-old conflict. The EU’s demonstrated inability to mediate cross-border conflict in the region foreshadows that Ukraine may have been economically colonised by another failing state.

Keywords: neoliberalism, imperealism, Russian-Ukrainian conflict, democratisation, colonisation

Procedia PDF Downloads 180
292 Volcanostratigraphy Reconaissance Study Using Ridge Continuity to Solve Complex Volcanic Deposit Problems, Case Study Old Sunda Volcano

Authors: Afy Syahidan ACHMAD, Astin NURDIANA, SURYANTINI

Abstract:

In volcanic arc environment we can find multiple volcanic deposits which overlapped with another volcanic deposit so it will complicates source and distribution determination. This problem getting more difficult when we can not trace any deposit border evidences in field especially in high vegetation volcanic area, or overlapped deposit with same characteristics. Main purpose of this study is to solve complex volcanostratigraphy mapping problems trough ridge, valley, and river continuity. This method application carried out in Old Sunda Volcanic, West Java, Indonesia. Using 1:100.000 and 1:50.000 topographic map, and regional geology map, old sunda volcanic deposit was differentiated in regional level and detail level. Final product of this method is volcanostratigraphy unit determination in reconnaissance stage to simplify mapping process.

Keywords: volcanostratigraphy, study, method, volcanic deposit

Procedia PDF Downloads 397
291 An Exploration of the Emergency Staff’s Perceptions and Experiences of Teamwork and the Skills Required in the Emergency Department in Saudi Arabia

Authors: Sami Alanazi

Abstract:

Teamwork practices have been recognized as a significant strategy to improve patient safety, quality of care, and staff and patient satisfaction in healthcare settings, particularly within the emergency department (ED). The EDs depend heavily on teams of interdisciplinary healthcare staff to carry out their operational goals and core business of providing care to the serious illness and injured. The ED is also recognized as a high-risk area in relation to service demand and the potential for human error. Few studies have considered the perceptions and experiences of the ED staff (physicians, nurses, allied health professionals, and administration staff) about the practice of teamwork, especially in Saudi Arabia (SA), and no studies have been conducted to explore the practices of teamwork in the EDs. Aim: To explore the practices of teamwork from the perspectives and experiences of staff (physicians, nurses, allied health professionals, and administration staff) when interacting with each other in the admission areas in the ED of a public hospital in the Northern Border region of SA. Method: A qualitative case study design was utilized, drawing on two methods for the data collection, comprising of semi-structured interviews (n=22) with physicians (6), nurses (10), allied health professionals (3), and administrative members (3) working in the ED of a hospital in the Northern Border region of SA. The second method is non-participant direct observation. All data were analyzed using thematic analysis. Findings: The main themes that emerged from the analysis were as follows: the meaningful of teamwork, reasons of teamwork, the ED environmental factors, the organizational factors, the value of communication, leadership, teamwork skills in the ED, team members' behaviors, multicultural teamwork, and patients and families behaviors theme. Discussion: Working in the ED environment played a major role in affecting work performance as well as team dynamics. However, Communication, time management, fast-paced performance, multitasking, motivation, leadership, and stress management were highlighted by the participants as fundamental skills that have a major impact on team members and patients in the ED. It was found that the behaviors of the team members impacted the team dynamics as well as ED health services. Behaviors such as disputes among team members, conflict, cooperation, uncooperative members, neglect, and emotions of the members. Besides that, the behaviors of the patients and their accompanies had a direct impact on the team and the quality of the services. In addition, the differences in the cultures have separated the team members and created undesirable gaps such the gender segregation, national origin discrimination, and similarity and different in interests. Conclusion: Effective teamwork, in the context of the emergency department, was recognized as an essential element to obtain the quality of care as well as improve staff satisfaction.

Keywords: teamwork, barrier, facilitator, emergencydepartment

Procedia PDF Downloads 133
290 Ukrainians Professors in a Luso-Hispanophone Brazilian Border Region: a Case-Study on the Management of Multilingualism in Higher Education

Authors: Isis Ribeiro Berger

Abstract:

In view of recent war conflicts between Russia and Ukraine, the government of Paraná State, in Brazil, started a program to host Ukrainian scientists in state universities in 2022. The initiative aimed at integrating these scientists into the Brazilian academic community, strengthening the role of universities in producing science and innovation even in times of war, as well as fostering Higher Education internationalization. Paraná state was a pioneer in this initiative due to the fact it has been home to the largest contingent of immigrants and descendants of Ukrainians in Brazil because of migratory processes that began at the end of the 19th century. One of the universities receiving Ukrainian scientists is in Foz do Iguaçu, a city that borders Argentina and Paraguay. It is a multilingual environment, whose majority languages are Portuguese (the official language of Brazil), Spanish (the official language of both Argentina and Paraguay), as well as Guarani (the co-official indigenous language of Paraguay). It is in such a sociolinguistic environment that two Ukrainian professors began their activities within the scope of an Interdisciplinary Postgraduate Program (master’s and doctorate degree). This case study, whose theme is the management of multilingualism, was developed within the scope of Language Policy. It aimed at identifying the attitudes of both Ukrainian professors and postgraduate students towards multilingualism in this context, given the plural linguistic repertoire of the academic community, as well as identifying the language management strategies for the construction of knowledge implemented by the program and in the classroom by these participants. Therefore, the study was conducted under a qualitative approach, for which surveys and interviews were adopted as part of its methodological procedures. Data revealed the presence of different languages in the classroom (Portuguese, Spanish, English and Ukrainian), which made pedagogical practices challenging for both professors and students, whose levels of knowledge in the different languages varied significantly. The results indicate that multilingualism was the norm as the means of instruction adopted in this context, in which bilingual Portuguese-English-Ukrainian instruction was used by the professors in their lectures. Although English has been privileged for the internationalization of Higher Education in various contexts, it was not used as an exclusive means of instruction in this case, mostly because it is a predominantly Portuguese-Spanish-speaking environment. In addition, the professors counted on the mediation of an interpreter hired by the program since not every student had sufficient knowledge of English as part of their repertoires. The findings also suggest Portuguese is the language that most of the participants of this study prefer, both because it is the mother tongue of majority, and because it is the official language of the host country to the professors, who have sought to integrate to the local culture and community. This research is inserted in the Axis: Multilingualism and Education, of the UNESCO Chair on Language Policies for Multilingualism to which this study is related.

Keywords: attitudes, border region, multilingualism management, Ukrainian professors

Procedia PDF Downloads 58
289 Measuring Tail-Risk Spillover in the International Banking Industry

Authors: Lidia Sanchis-Marco, Antonio Rubia

Abstract:

In this paper we analyze the state-dependent risk-spillover in different economic areas. To this end, we apply the quantile regression-based methodology developed in Adams, Füss and Gropp approach to examine the spillover in conditional tails of daily returns of indices of the banking industry in the US, BRICs, Peripheral EMU, Core EMU, Scandinavia, the UK and Emerging Markets. This methodology allow us to characterize size, direction and strength of financial contagion in a network of bilateral exposures to address cross-border vulnerabilities under different states of the economy. The general evidence shows as the spillover effects are higher and more significant in volatile periods than in tranquil ones. There is evidence of tail spillovers of which much is attributable to a spillover from the US on the rest of the analyzed regions, specially on European countries. In sharp contrast, the US banking system show more financial resilience against foreign shocks.

Keywords: spillover effects, Bank Contagion, SDSVaR, expected shortfall, VaR, expectiles

Procedia PDF Downloads 486
288 A Socio-Technical Approach to Cyber-Risk Assessment

Authors: Kitty Kioskli, Nineta Polemi

Abstract:

Evaluating the levels of cyber-security risks within an enterprise is most important in protecting its information system, services and all its digital assets against security incidents (e.g. accidents, malicious acts, massive cyber-attacks). The existing risk assessment methodologies (e.g. eBIOS, OCTAVE, CRAMM, NIST-800) adopt a technical approach considering as attack factors only the capability, intention and target of the attacker, and not paying attention to the attacker’s psychological profile and personality traits. In this paper, a socio-technical approach is proposed in cyber risk assessment, in order to achieve more realistic risk estimates by considering the personality traits of the attackers. In particular, based upon principles from investigative psychology and behavioural science, a multi-dimensional, extended, quantifiable model for an attacker’s profile is developed, which becomes an additional factor in the cyber risk level calculation.

Keywords: attacker, behavioural models, cyber risk assessment, cybersecurity, human factors, investigative psychology, ISO27001, ISO27005

Procedia PDF Downloads 155
287 Literature Review: Adversarial Machine Learning Defense in Malware Detection

Authors: Leidy M. Aldana, Jorge E. Camargo

Abstract:

Adversarial Machine Learning has gained importance in recent years as Cybersecurity has gained too, especially malware, it has affected different entities and people in recent years. This paper shows a literature review about defense methods created to prevent adversarial machine learning attacks, firstable it shows an introduction about the context and the description of some terms, in the results section some of the attacks are described, focusing on detecting adversarial examples before coming to the machine learning algorithm and showing other categories that exist in defense. A method with five steps is proposed in the method section in order to define a way to make the literature review; in addition, this paper summarizes the contributions in this research field in the last seven years to identify research directions in this area. About the findings, the category with least quantity of challenges in defense is the Detection of adversarial examples being this one a viable research route with the adaptive approach in attack and defense.

Keywords: Malware, adversarial, machine learning, defense, attack

Procedia PDF Downloads 57
286 Practical Survival Strategies among Undocumented and Documented Brazilian Immigrants in Europe: A Comparative Study in Milan and London

Authors: Edmar Jose da Rocha

Abstract:

This paper is a study on Brazilian irregular migrants living and working in two global cities in Europe, Milan and London. The aim of the journal is to show out why Brazilian choose irregular migration to Milan and London as a strategy. Few studies in Europe have focused on groups coming from the same place of origin and residing in different cities in comparative studies. It is this international comparison that makes this research original. Both in London and Milan there is an economic migration. The reasons showed to migrate to Milan were marriage, citizenship and work. The reasons indicated to migrate to London were work, studies and a better life. In London marriage is a channel for regularisation and citizenship. In both countries, fake documents is a channel for undocumented people to get a job and health care.

Keywords: border, immigration, integration, survival strategies, undocumented, regularisation

Procedia PDF Downloads 312
285 The Impact of Health Tourism on Companies’ Performance: A Cross Country Analysis

Authors: Anna Paola Micheli, Carmelo Intrisano, Anna Maria Calce

Abstract:

This research focused on the capability of health tourism to improve the economic and financial performance of healthcare companies. It is assumed that health tourism companies have better profitability and financial efficiency because they can also count on cross-border demand differently from no health tourism companies. A three-level gap analysis was conducted: the first concerns health tourism companies located in Italy and in the other EU28 states; in the second Italian and EU28, no health tourism companies were compared; the third level is about the Italian system with a comparison between health tourism and no health tourism companies. Findings highlighted that Italian healthcare companies have better profitability performance if compared to European ones, but they present weaknesses in the financial position given the illiquidity and excessive leverage. Furthermore, studying the Italian system, we found that health tourism companies are more profitable than no health tourism companies.

Keywords: financial performance, gap analysis, health tourism, profitability performance, value creation

Procedia PDF Downloads 221
284 Implementing Zero-Trust Security with Passwordless Authentication Gateways for Privacy-Oriented Organizations Using Keycloak

Authors: Andrei Bogdan Stanescu, Laura Diaconescu

Abstract:

With the increasing concerns about data breaches and privacy violations, organizations seek robust security measures to protect sensitive information. This research paper highlights the importance of implementing the Zero-Trust Security methodology using Passwordless Authentication Gateways that leverage Keycloak, an open-source Identity and Access Management (IAM) software, as a solution to address the security challenges these organizations face. The paper presents the successful implementation and deployment of such a solution in a mid-size, privacy-oriented organization. The implementation resulted in significant security improvements, reducing the risk of unauthorized access and potential data breaches. Moreover, user feedback indicated enhanced convenience and streamlined authentication experiences. The results of this study bring solid contributions in the field of cybersecurity and provide practical insights for organizations aiming to strengthen their security practices.

Keywords: identity and access management, passwordless authentication, privacy, zero-trust security

Procedia PDF Downloads 85
283 Jordan Curves in the Digital Plane with Respect to the Connectednesses given by Certain Adjacency Graphs

Authors: Josef Slapal

Abstract:

Digital images are approximations of real ones and, therefore, to be able to study them, we need the digital plane Z2 to be equipped with a convenient structure that behaves analogously to the Euclidean topology on the real plane. In particular, it is required that such a structure allows for a digital analogue of the Jordan curve theorem. We introduce certain adjacency graphs on the digital plane and prove digital Jordan curves for them thus showing that the graphs provide convenient structures on Z2 for the study and processing of digital images. Further convenient structures including the wellknown Khalimsky and Marcus-Wyse adjacency graphs may be obtained as quotients of the graphs introduced. Since digital Jordan curves represent borders of objects in digital images, the adjacency graphs discussed may be used as background structures on the digital plane for solving the problems of digital image processing that are closely related to borders like border detection, contour filling, pattern recognition, thinning, etc.

Keywords: digital plane, adjacency graph, Jordan curve, quotient adjacency

Procedia PDF Downloads 373
282 Exploring Cybercrimes and Major Security Breaches: Assessing the Broader Fiscal Impact on Nigeria

Authors: Washima Tuleun

Abstract:

Cybercrime is a global concern, and Nigeria is not immune to its effects. This paper investigates the cybercrimes and significant cyber-attacks that have targeted businesses and institutions in Nigeria, examining their various forms and the financial and economic impacts they have on individuals, businesses, and the nation as a whole. As technological advancements rapidly evolve and online services gain widespread adoption, there has been a corresponding rise in cyber-related attacks. These attacks often target personal data, exploit system vulnerabilities, and result in the theft of sensitive information, leading to financial losses, reputational damage, and broader impacts on organizations. The study conducts a thorough review of existing literature, case studies, and statistical data to provide a comprehensive understanding of Nigeria’s cybercrime landscape. Additionally, it assesses the efforts by both the government and the private sector to address these challenges and offers recommendations for more effective strategies to mitigate and reduce their impact.

Keywords: cybersecurity, telecommunications engineering, information technology, threat intelligence, vulnerability management, computing

Procedia PDF Downloads 15
281 sing Eye Tracking to Measure the Impact of Persuasion Principles in Phishing Emails

Authors: Laura Bishop, Isabel Jones, Linn Halvorsen, Angela Smith

Abstract:

Phishing emails are a form of social engineering where attackers deceive email users into revealing sensitive information or installing malware such as ransomware. Scammers often use persuasion techniques to influence email users to interact with malicious content. This study will use eye-tracking equipment to analyze how participants respond to and process Cialdini’s persuasion principles when utilized within phishing emails. Eye tracking provides insights into what is happening on the subconscious level of the brain that the participant may not be aware of. An experiment is conducted to track participant eye movements, whilst interacting with and then filing a series of persuasive emails delivered at random. Eye tracking metrics will be analyzed in relation to whether a malicious email has been identified as phishing (filed as ‘suspicious’) or not phishing (filed in any other folder). This will help determine the most influential persuasion techniques and those 'areas of interest' within an email that require intervention. The results will aid further research on how to reduce the effects of persuasion on human decision-making when interacting with phishing emails.

Keywords: cybersecurity, human-centric, phishing, psychology

Procedia PDF Downloads 72
280 System Security Impact on the Dynamic Characteristics of Measurement Sensors in Smart Grids

Authors: Yiyang Su, Jörg Neumann, Jan Wetzlich, Florian Thiel

Abstract:

Smart grid is a term used to describe the next generation power grid. New challenges such as integration of renewable and decentralized energy sources, the requirement for continuous grid estimation and optimization, as well as the use of two-way flows of energy have been brought to the power gird. In order to achieve efficient, reliable, sustainable, as well as secure delivery of electric power more and more information and communication technologies are used for the monitoring and the control of power grids. Consequently, the need for cybersecurity is dramatically increased and has converged into several standards which will be presented here. These standards for the smart grid must be designed to satisfy both performance and reliability requirements. An in depth investigation of the effect of retrospectively embedded security in existing grids on it’s dynamic behavior is required. Therefore, a retrofitting plan for existing meters is offered, and it’s performance in a test low voltage microgrid is investigated. As a result of this, integration of security measures into measurement architectures of smart grids at the design phase is strongly recommended.

Keywords: cyber security, performance, protocols, security standards, smart grid

Procedia PDF Downloads 313
279 Benchmarking of Pentesting Tools

Authors: Esteban Alejandro Armas Vega, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

Abstract:

The benchmarking of tools for dynamic analysis of vulnerabilities in web applications is something that is done periodically, because these tools from time to time update their knowledge base and search algorithms, in order to improve their accuracy. Unfortunately, the vast majority of these evaluations are made by software enthusiasts who publish their results on blogs or on non-academic websites and always with the same evaluation methodology. Similarly, academics who have carried out this type of analysis from a scientific approach, the majority, make their analysis within the same methodology as well the empirical authors. This paper is based on the interest of finding answers to questions that many users of this type of tools have been asking over the years, such as, to know if the tool truly test and evaluate every vulnerability that it ensures do, or if the tool, really, deliver a real report of all the vulnerabilities tested and exploited. This kind of questions have also motivated previous work but without real answers. The aim of this paper is to show results that truly answer, at least on the tested tools, all those unanswered questions. All the results have been obtained by changing the common model of benchmarking used for all those previous works.

Keywords: cybersecurity, IDS, security, web scanners, web vulnerabilities

Procedia PDF Downloads 314
278 Termination of the Brachial Artery in the Arm and Its Clinical Significance

Authors: Ramya Rathan, Miral N. F. Salama

Abstract:

The variations in the arteries have been drawing attention of anatomists for a long time because of their clinical significance. The brachial artery is the principal artery of the arm which is the continuation of the axillary artery from the lower border of the Teres Major. It terminates into the radial and ulnar arteries below the elbow joint at the neck radius. The present study aims at exploring the clinical significance of the high termination of the brachial artery. During the routine cadaveric dissection of the arm, for the undergraduate students of medicine at our university, we observed a high bifurcation of the radial and the ulnar artery at the midshaft of the humerus. The median nerve was seen passing between these two junctions. Further, the course and the relations of this artery were studied. The accurate knowledge regarding these kinds of variation in the blood vessels is mandatory for planning of designing. General physicians, surgeons and radiologists should keep in mind the variations in the branching pattern of the arteries in their daily medical, diagnostic and therapeutic procedures to avoid complications in diagnostic and surgical procedures.

Keywords: brachial artery, high termination, radial artery, ulnar artery

Procedia PDF Downloads 161
277 Addressing Security and Privacy Issues in a Smart Environment by Using Block-Chain as a Preemptive Technique

Authors: Shahbaz Pervez, Aljawharah Almuhana, Zahida Parveen, Samina Naz, Hira Tariq, Seyed Hosseini, Muhammad Awais Azam

Abstract:

With the latest development in the field of cutting-edge technologies, there is a rapid increase in the use of technology-oriented gadgets. In a recent scenario of the tech era, there is increasing demand to fulfill our day-to-day routine tasks with the help of technological gadgets. We are living in an era of technology where trends have been changing, and a race to introduce a new technology gadget has already begun. Smart cities are getting more popular with every passing day; city councils and governments are under enormous pressure to provide the latest services for their citizens and equip them with all the latest facilities. Thus, ultimately, they are going more into smart cities infrastructure building, providing services to their inhabitants with a single click from their smart devices. This trend is very exciting, but on the other hand, if some incident of security breach happens due to any weaker link, the results would be catastrophic. This paper addresses potential security and privacy breaches with a possible solution by using Blockchain technology in IoT enabled environment.

Keywords: blockchain, cybersecurity, DDOS, intrusion detection, IoT, RFID, smart devices security, smart services

Procedia PDF Downloads 108
276 Protection Not Punishment: Use of Electronic Monitoring to Reduce the Risk of Cross-Border Parental Child Abduction

Authors: Nazia Yaqub

Abstract:

Globally, the number of cases of international parental child abduction has remained consistent in the past decade despite the legal provision designed to prevent and deter abduction, and so it appears the current legal approach to prevent abduction is lacking. Reflecting on the findings of an empirical study conducted by the author between 2017-19 on parental abduction from the UK, the article considers a solution to the predicament of protecting children at risk of abduction through electronic monitoring. The electronic monitoring of children has negative connotations, particularly in its use in the criminal justice system, yet in the context of family law proceedings, the article considers whether electronic monitoring could serve a protective rather than a punitive purpose. The article reflects on the use of electronic monitoring in parental abduction cases by the Family Courts and examines the ethical considerations of the proposal, drawing on the rights found in the European Convention on Human Rights and the UN Convention on the Rights of the Child.

Keywords: law, parental child abduction, electronic monitoring, legal solutions

Procedia PDF Downloads 65
275 Limes Africanus: Tribes, Romans and Islamic Dynasties

Authors: Erika Mattio , Edoardo Casolo

Abstract:

This project studies in a complete and innovative way the lesser known southern roman border: the limes africanus. In this work, thanks to the comparison of archaeological, historical and epigraphic sources, the evolution and changes that occurred in the cities and areas around the limes were analysed. As of now, there are many studies relative to the roman imperial period, however there are not that many analysing the evolution of the limes from the Islamic conquest to the modern day, comparing the ancient, byzantine, islamic and contemporary periods, understanding the significance of the limes, it s role and the cities and commerce that were defined by it in north Africa. Using modern methods of remote sensing and landscape archaeology, a georeferencing of the area documented in the thirties of the last century by French military aviation colonel Jean Baradez was created, showing that the limes africanus had survived the fall of the roman empire and continued to be important also for the Islamic dynasties that came later, even until the italo-turkish war and the Italian conquest of Libya. With this research we wish to demonstrate the continuation through time of the limes africanus and whether today it exists still or not.

Keywords: Limes Tripolitanus, Muslim, North Africa, Romans

Procedia PDF Downloads 195
274 A Genetic Algorithm Based Ensemble Method with Pairwise Consensus Score on Malware Cacophonous Labels

Authors: Shih-Yu Wang, Shun-Wen Hsiao

Abstract:

In the field of cybersecurity, there exists many vendors giving malware samples classified results, namely naming after the label that contains some important information which is also called AV label. Lots of researchers relay on AV labels for research. Unfortunately, AV labels are too cluttered. They do not have a fixed format and fixed naming rules because the naming results were based on each classifiers' viewpoints. A way to fix the problem is taking a majority vote. However, voting can sometimes create problems of bias. Thus, we create a novel ensemble approach which does not rely on the cacophonous naming result but depend on group identification to aggregate everyone's opinion. To achieve this purpose, we develop an scoring system called Pairwise Consensus Score (PCS) to calculate result similarity. The entire method architecture combine Genetic Algorithm and PCS to find maximum consensus in the group. Experimental results revealed that our method outperformed the majority voting by 10% in term of the score.

Keywords: genetic algorithm, ensemble learning, malware family, malware labeling, AV labels

Procedia PDF Downloads 81
273 The Hague Abduction Convention and the Egyptian Position: Strategizing for a Law Reform

Authors: Abdalla Ahmed Abdrabou Emam Eldeib

Abstract:

For more than a century, the Hague Conference has tackled issues in the most challenging areas of private international law, including family law. Its actions in the realm of international child abduction have been remarkable in two ways during the last two decades. First, on October 25, 1980, the Hague Convention on the Civil Aspects of International Child Abduction (the Convention) was promulgated as an unusually inventive and powerful tool. Second, the Convention is rapidly becoming more prominent in the development of international child law. By that time, overseas travel had grown more convenient, and more couples were marrying or travelling across national lines. At the same time, parental separation and divorce have increased, leading to an increase in international child custody battles. The convention they drafted avoids legal quagmires and addresses extra-legal issues well. It literally restores the kid to its place of usual residence by establishing that the youngster was unlawfully abducted from that position or, alternatively, was wrongfully kept abroad after an allowed visit. Legal custody of a child of a contested parent is usually followed by the child's abduction or unlawful relocation to another country by the non-custodial parent or other persons. If a child's custodial parent lives outside of Egypt, the youngster may be kidnapped and brought to Egypt. It's natural to ask what laws should apply and what legal norms should be followed while hearing individual instances. This study comprehensively evaluates and estimates the relevant Hague Child Abduction Convention and the current situation in Egypt and which law is applicable for child custody. In addition, this research emphasis, detail, and focus on the position of Cross-border parental child abductions in Egypt. Moreover, examine the Islamic law compared to the Hague Convention on Child Custody in detail, as well as mentioning the treatment of Islamic countries in this matter in general and Egypt's treatment of this matter in particular, as well as the criticism directed at Egypt regarding the application and implementation of child custody issues. The present research backs up this method by using non-doctrinal techniques, including surveys, interviews, and dialogues. An important objective of this research is to examine the factors that contribute to parental child abduction. In this case, family court attorneys and other interested parties serve as the target audience from whom data is collected. A survey questionnaire was developed and sent to the target population in order to collect data for future empirical testing to validate the identified critical factors on Parental Child Abduction. The main finding in this study is breaking the reservations of many Muslim countries to join the Hague Convention with regard to child custody., Likewise, clarify the problems of implementation in practice in cases of kidnapping a child from one of the parents and traveling with him outside the borders of the country. Finally, this study is to provide suggestions for reforming the current Egyptian Family Law to make it an effective and efficient for all dispute's resolution mechanism and the possibility of joining The Hague Convention.

Keywords: egyptian family law, Hague child abduction convention, child custody, cross-border parental child abductions in egypt

Procedia PDF Downloads 67