Search results for: security experiences
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5407

Search results for: security experiences

2977 A Review Paper for Detecting Zero-Day Vulnerabilities

Authors: Tshegofatso Rambau, Tonderai Muchenje

Abstract:

Zero-day attacks (ZDA) are increasing day by day; there are many vulnerabilities in systems and software that date back decades. Companies keep discovering vulnerabilities in their systems and software and work to release patches and updates. A zero-day vulnerability is a software fault that is not widely known and is unknown to the vendor; attackers work very quickly to exploit these vulnerabilities. These are major security threats with a high success rate because businesses lack the essential safeguards to detect and prevent them. This study focuses on the factors and techniques that can help us detect zero-day attacks. There are various methods and techniques for detecting vulnerabilities. Various companies like edges can offer penetration testing and smart vulnerability management solutions. We will undertake literature studies on zero-day attacks and detection methods, as well as modeling approaches and simulations, as part of the study process.

Keywords: zero-day attacks, exploitation, vulnerabilities

Procedia PDF Downloads 100
2976 Non-Time and Non-Sense: Temporalities of Addiction for Heroin Users in Scotland

Authors: Laura Roe

Abstract:

This study draws on twelve months of ethnographic fieldwork conducted in 2017 with heroin and poly-substance users in Scotland and explores experiences of time and temporality as factors in continuing drug use. The research largely took place over the year in which drug-related deaths in Scotland reached a record high, and were statistically recorded as the highest in Europe. This qualitative research is therefore significant in understanding both evolving patterns of drug use and the experiential lifeworlds of those who use heroin and other substances in high doses. Methodologies included participant observation, structured and semi-structured interviews, and unstructured conversations with twenty-two regular participants. The fieldwork was conducted in two needle exchanges, a community recovery group and in the community. The initial aim of the study was to assess evolving patterns of drug preferences in order to explore a clinical and user-reported rise in the use of novel psychoactive substances (NPS), which are typically considered to be highly potent, synthetic substances, often available at a low cost. It was found, however, that while most research participants had experimented with NPS with varying intensity, those who used every day regularly consumed heroin, methadone, and alcohol with benzodiazepines such as diazepam or anticonvulsants such as gabapentin. The research found that many participants deliberately pursued the non-fatal effects of overdose, aiming to induce states of dissociation, detachment and uneven consciousness, and did so by both mixing substances and experimenting with novel modes of consumption. Temporality was significant in the decision to consume cocktails of substances, as users described wishing to sever themselves from time; entering into states of ‘non-time’ and insensibility through specific modes of intoxication. Time and temporality similarly impacted other aspects of addicted life. Periods of attempted abstinence witnessed a slowing of time’s passage that was tied to affective states of boredom and melancholy, in addition to a disruptive return of distressing and difficult memories. Abject past memories frequently dominated and disrupted the present, which otherwise could be highly immersive due to the time and energy-consuming nature of seeking drugs while in financial difficulty. There was furthermore a discordance between individual user temporalities and the strict time-based regimes of recovery services and institutional bodies, and the study aims to highlight the impact of such a disjuncture on the efficacy of treatment programs. Many participants had difficulty in adhering to set appointments or temporal frameworks due to their specific temporal situatedness. Overall, exploring increasing tendencies of heroin users in Scotland towards poly-substance use, this study draws on experiences and perceptions of time, analysing how temporality comes to bear on the ways drugs are sought and consumed, and how recovery is imagined and enacted. The study attempts to outline the experiential, intimate and subjective worlds of heroin and poly-substance users while explicating the structural and historical factors that shape them.

Keywords: addiction, poly-substance use, temporality, timelessness

Procedia PDF Downloads 115
2975 Results concerning the University: Industry Partnership for a Research Project Implementation (MUROS) in the Romanian Program Star

Authors: Loretta Ichim, Dan Popescu, Grigore Stamatescu

Abstract:

The paper reports the collaboration between a top university from Romania and three companies for the implementation of a research project in a multidisciplinary domain, focusing on the impact and benefits both for the education and industry. The joint activities were developed under the Space Technology and Advanced Research Program (STAR), funded by the Romanian Space Agency (ROSA) for a university-industry partnership. The context was defined by linking the European Space Agency optional programs, with the development and promotion national research, with the educational and industrial capabilities in the aeronautics, security and related areas by increasing the collaboration between academic and industrial entities as well as by realizing high-level scientific production. The project name is Multisensory Robotic System for Aerial Monitoring of Critical Infrastructure Systems (MUROS), which was carried 2013-2016. The project included the University POLITEHNICA of Bucharest (coordinator) and three companies, which manufacture and market unmanned aerial systems. The project had as main objective the development of an integrated system for combined ground wireless sensor networks and UAV monitoring in various application scenarios for critical infrastructure surveillance. This included specific activities related to fundamental and applied research, technology transfer, prototype implementation and result dissemination. The core area of the contributions laid in distributed data processing and communication mechanisms, advanced image processing and embedded system development. Special focus is given by the paper to analyzing the impact the project implementation in the educational process, directly or indirectly, through the faculty members (professors and students) involved in the research team. Three main directions are discussed: a) enabling students to carry out internships at the partner companies, b) handling advanced topics and industry requirements at the master's level, c) experiments and concept validation for doctoral thesis. The impact of the research work (as the educational component) developed by the faculty members on the increasing performances of the companies’ products is highlighted. The collaboration between university and companies was well balanced both for contributions and results. The paper also presents the outcomes of the project which reveals the efficient collaboration between high education and industry: master thesis, doctoral thesis, conference papers, journal papers, technical documentation for technology transfer, prototype, and patent. The experience can provide useful practices of blending research and education within an academia-industry cooperation framework while the lessons learned represent a starting point in debating the new role of advanced research and development performing companies in association with higher education. This partnership, promoted at UE level, has a broad impact beyond the constrained scope of a single project and can develop into long-lasting collaboration while benefiting all stakeholders: students, universities and the surrounding knowledge-based economic and industrial ecosystem. Due to the exchange of experiences between the university (UPB) and the manufacturing company (AFT Design), a new project, SIMUL, under the Bridge Grant Program (Romanian executive agency UEFISCDI) was started (2016 – 2017). This project will continue the educational research for innovation on master and doctoral studies in MUROS thematic (collaborative multi-UAV application for flood detection).

Keywords: education process, multisensory robotic system, research and innovation project, technology transfer, university-industry partnership

Procedia PDF Downloads 237
2974 Disaster Preparedness for Academic Libraries in Malaysia: An Exploratory Study

Authors: Siti Juryiah Mohd Khalid, Norazlina Dol

Abstract:

Academic libraries in Malaysia are still not prepared for disaster even though several occasions have been reported. The study sets out to assess the current status of preparedness in disaster management among Malaysian academic libraries in the State of Selangor and the Federal Territory of Kuala Lumpur. To obtain a base level of knowledge on disaster preparedness of current practices, a questionnaire was distributed to chief librarians or their assignees in charge of disaster or emergency preparedness at 40 academic libraries and 34 responses were received. The study revolved around the current status of preparedness, on various issues including existence of disaster preparedness plan among academic libraries in Malaysia, disaster experiences by the academic libraries, funding, risk assessment activities and involvement of library staff in disaster management. Frequency and percentage tables were used in the analysis of the data collected. Some of the academic libraries under study have experienced one form of disaster or the other. Most of the academic libraries do not have a written disaster preparedness plan. The risk assessments and staff involvement in disaster preparedness by these libraries were generally adequate.

Keywords: academic libraries, disaster preparedness plan, disaster management, emergency plan

Procedia PDF Downloads 357
2973 The Implications of Some Social Variables in Increasing the Unemployed in Egypt

Authors: Mohamed Elkhouli

Abstract:

This research sets out to identify some social factors or variables that may need to be controlled in order to decrease the volume of unemployed in Egypt. As well as, it comes to investigate the relationship between a set of social variables and unemployment issue in Egypt in the sake of determining the most important social variables influencing the rise of unemployed during the time series targeted (2002-2012). Highlighting the unemployment issue is becoming an increasingly important topic in all countries throughout the world resulting from expand their globalization efforts. In general, the study tries to determine what the most social priorities are likely to adopt seriously by the Egypt's government in order to solve the unemployed problem. The results showed that the low value for both of small projects and the total value of disbursed social security respectively have significant impact on increasing the No. of unemployed in Egypt, according to the target period by the current study.

Keywords: Egypt, social status, unemployment, unemployed

Procedia PDF Downloads 320
2972 Development of a Serial Signal Monitoring Program for Educational Purposes

Authors: Jungho Moon, Lae-Jeong Park

Abstract:

This paper introduces a signal monitoring program developed with a view to helping electrical engineering students get familiar with sensors with digital output. Because the output of digital sensors cannot be simply monitored by a measuring instrument such as an oscilloscope, students tend to have a hard time dealing with digital sensors. The monitoring program runs on a PC and communicates with an MCU that reads the output of digital sensors via an asynchronous communication interface. Receiving the sensor data from the MCU, the monitoring program shows time and/or frequency domain plots of the data in real time. In addition, the monitoring program provides a serial terminal that enables the user to exchange text information with the MCU while the received data is plotted. The user can easily observe the output of digital sensors and configure the digital sensors in real time, which helps students who do not have enough experiences with digital sensors. Though the monitoring program was programmed in the Matlab programming language, it runs without the Matlab since it was compiled as a standalone executable.

Keywords: digital sensor, MATLAB, MCU, signal monitoring program

Procedia PDF Downloads 491
2971 The Popular Imagination through the Poem of “Ras B’Nadam”

Authors: Hirreche Baghdad Mohamed

Abstract:

One of the main texts in popular culture in Algeria is a symbolic and imaginary tale, through which the author was able to derive from the world and popular cultural stock and symbolic capital elements that enabled him to create a synthesis between a number of imaginary and real events. Thanks to the level of spirituality that the author was experiencing, he was able to go deep in order to redraw the boundaries of human life in view of its existence and status (life experiences, its end, and its fate). It is a text that is consistent with religious values and has a philosophical depth. This poem can be shared in official and unofficial meetings, during feasts, and during popular celebrations, such as circumcision ceremonies, marriage, and condolences. It has also the ability to draw attention and appeal to the listener and let him travel into the imaginary world. It is the text related to the story of "Ras b’nadem", or "the head of a man", or rather, a "human skull", for which only a few academic studies have been devoted, and there are two copies of it, one attributed to Lakhdar Ibn Khalouf as a matter of suspicion, while the other is attributed to Qadour Ibn Ashour Al-Zarhouni.

Keywords: ras B’Nadam, ras al mahna, lakhdar ibn khalouf, qadour ibn ashour, sufism, melhoun poetry, resistance poetry

Procedia PDF Downloads 190
2970 Study of the Behavior of Geogrid Mechanically Stabilized Earth Walls Under Cyclic Loading

Authors: Yongzhe Zhao, Ying Liu, Zhiyong Liu, Hui You

Abstract:

The soil behind retaining wall is normally subjected to cyclic loading, for example traffic loading. Geotextile has been widely used to reinforce the soil for the purpose of reducing the settlement of the soil. A series of physical model tests were performed to investigate the settlement of footing under cyclic loading. The settlement of the footing, ground deformation and the vertical earth pressure in subsoil were presented and discussed under different types of geotextiles. The results indicate that including geotextiles significantly decreases the footing settlement and the stiffer the geotextile, the less the settlement. Under cyclic loading, the soil below the footing shows dilation within certain depths and beyond that it experiences contraction. The location of footing relative to the retaining wall has important effects on the deformation behavior of the soil in the ground, and the closer the footing to the retaining wall, the greater the contraction soil shows. This is because the retaining wall experienced greater lateral displacement.

Keywords: physical model tests, reinforced retaining wall, cyclic loading, footing

Procedia PDF Downloads 152
2969 Australian Teachers and School Leaders’ Use of Differentiated Learning Experiences as Responsive Teaching for Students with ADHD

Authors: Kathy Gibbs

Abstract:

There is a paucity of research in Australia about educators’ use of differentiated instruction (DI) to support the learning of students with ADHD. This study reports on small-scale, qualitative research using interviews with teachers and school leaders to identify how they use DI as an effective teaching instruction for students with ADHD. Findings showed that teachers and school leaders have a good understanding of ADHD; teachers use DI as an effective teaching practice to enhance learning for this student group and ensure the classroom environment is safe and secure. However, they do not adjust assessments for students with ADHD. School leaders are not clear on how teachers differentiate assessments or adapt to the classroom environment. These results highlight the need for further research at the teacher and teacher-educator level teachers to ensure teaching practices are effective in reducing unwanted behaviours that prevent students with ADHD from achieving their full academic potential.

Keywords: teachers, differentiated instruction, ADHD, student learning, educators knowledge

Procedia PDF Downloads 49
2968 Application of Molecular Markers for Crop Improvement

Authors: Monisha Isaac

Abstract:

Use of molecular markers for selecting plants with desired traits has been started long back. Due to their heritable characteristics, they are useful for identification and characterization of specific genotypes. The study involves various types of molecular markers used to select multiple desired characters in plants, their properties, and advantages to improve crop productivity in adverse climatological conditions for the purpose of providing food security to fast-growing global population. The study shows that genetic similarities obtained from molecular markers provide more accurate information and the genetic diversity can be better estimated from the genetic relationship obtained from the dendrogram. The information obtained from markers assisted characterization is more suitable for the crops of economic importance like sugarcane.

Keywords: molecular markers, crop productivity, genetic diversity, genotype

Procedia PDF Downloads 513
2967 Indications and Characteristics of Clinical Application of Periodontal Suturing

Authors: Saimir Heta, Ilma Robo, Vera Ostreni, Glorja Demika, Sonila Kapaj

Abstract:

Suturing, as a procedure of joining the lips of the lembo or wound, is important at the beginning of the healing process. This procedure helps to pass the healing process from the procedure per secundam to the stages of healing per primam, thus logically reducing the healing time of the wound. The element that remains in the individual selection of the dentist applying the suture is the selection of the suture material. At a moment when some types of sutures are offered for use, some elements should be considered in the selection of the suture depending on the constituent material, the cross-section of the suture elements, and whether it collects bacteria in the "pits" created by the material. The presence of bacteria is a source of infection and possible delay in the healing of the sutured wound. Conclusion: The marketing of suture types offers a variety of materials, from which the selection of the most suitable suture type for specific application cases is a personal indication of the dental surgeon, based on professional experiences and knowledge in the field.

Keywords: suture, suture material, types of sutures, clinical application

Procedia PDF Downloads 79
2966 Affect and Helping Behavior as Explanatory Account of the Relationship between Psychological Safety and Supervisor Satisfaction

Authors: Mariam Musaddiq, Muhammad Ali Asadullah

Abstract:

Psychological safety is referred as a 'nonthreatening' and 'predictable' work environment leading employees, particularly interested to contribute positively to the organization, to engage and express their true selves at work without suffering negative results. We posit that the employee who is feeling psychologically safe experiences positive emotions, feels happy and shows helping behavior towards his coworkers and supervisors. Particularly, the supervisor reciprocates this helping behavior in form of greater satisfaction to the employee showing helping behavior. We tested our hypothesis in light of Feedback system theory and functional motive theory. We collected data from 453 employees and their supervisor in Pakistani hotels and restaurants through survey method. Result showed that positive affect and helping behavior mediate the relationship between psychological safety and supervisor satisfaction. Cross sectional design of the study is a major limitation of the study. Moreover, we focused on psychological safety only that is one of three dimensions of psychological conditions.

Keywords: affect, helping behavior, psychological safety, supervisor, supervisor satisfaction

Procedia PDF Downloads 411
2965 Well-being of Parents of Children with Autism Spectrum Disorder or Developmental Coordination Disorder: Cross-Cultural and Cross-disorder Comparative Studies

Authors: Léa Chawki, Émilie Cappe

Abstract:

Context: Nowadays, supporting parents of children with autism spectrum disorder (ASD) and helping them adjust to their child’s condition represents a core clinical and scientific necessity and is encouraged by the French National Strategy for Autism (2018). In France, ASD remains a challenging condition, causing distress, segregation and social stigma to concerned family members concerned by this handicap. The literature highlights that neurodevelopmental disorders in children, such as ASD, influence parental well-being. This impact could be different according to parents’ culture and the child’s particular disorder manifestation, such as developmental coordination disorder (DCC), for instance. Objectives: This present study aims to explore parental stress, anxiety and depressive symptoms, as well as the quality of life in parents of children with ASD or DCD, as well as the explicit individual, psychosocial and cultural factors of parental well-being. Methods: Participants will be recruited through diagnostic centers, child and specialized adolescent units, and organizations representing families with ASD and DCD. Our sample will include five groups of 150 parents: four groups of parents having children with ASD – one living in France, one in the US, one in Canada and the other in Lebanon – and one group of French parents of children with DCD. Self-evaluation measures will be filled directly by parents in order to measure parental stress, anxiety and depressive symptoms, quality of life, coping and emotional regulation strategies, internalized stigma, perceived social support, the child’s problem behaviors severity, as well as motor coordination deficits in children with ASD and DCD. A sociodemographic questionnaire will help collect additional useful data regarding participants and their children. Individual and semi-structured research interviews will be conducted to complete quantitative data by further exploring participants’ distinct experiences related to parenting a child with a neurodevelopmental disorder. An interview grid, specially designed for the needs of this study, will strengthen the comparison between the experiences of parents of children with ASD with those of parents of children with DCD. It will also help investigate cultural differences regarding parent support policies in the context of raising a child with ASD. Moreover, interviews will help clarify the link between certain research variables (behavioral differences between ASD and DCD, family leisure activities, family and children’s extracurricular life, etc.) and parental well-being. Research perspectives: Results of this study will provide a more holistic understanding of the roles of individual, psychosocial and cultural variables related to parental well-being. Thus, this study will help direct the implementation of support services offered to families of children with neurodevelopmental disorders (ASD and DCD). Also, the implications of this study are essential in order to guide families through changes related to public policies assisting neurodevelopmental disorders and other disabilities. The between-group comparison (ASD and DCD) is also expected to help clarify the origins of all the different challenges encountered by those families. Hence, it will be interesting to investigate whether complications perceived by parents are more likely to arise from child-symptom severity, or from the lack of support obtained from health and educational systems.

Keywords: Autism spectrum disorder, cross-cultural, cross-disorder, developmental coordination delay, well-being

Procedia PDF Downloads 98
2964 ISIS Resurgence in the Era of COVID-19

Authors: Stacey Pollard, Henry Baraket, Girish Ganesan, Natalie Kim

Abstract:

One year after U.S.-led coalition operations liberated ISIS-held territories in Iraq and Syria and killed ISIS core leader Abu Bakr al-Baghdadi, ISIS is resurging. Taking a page from its old playbook, the organization is capitalizing on social unrest and a rapidly deteriorating security environment—exacerbated by the COVID-19 pandemic—to reconstitute in permissive areas of Iraq and Syria. This Short examines ISIS’s pandemic-era ground and information operations through the lens of its state- and nation-making efforts to help analysts and decisionmakers better understand the imminence and scope of the threat. ISIS is rapidly overcoming U.S.-supported counterterrorism gains and, without direct pressure to reverse these advances, is poised for recovery.

Keywords: Terrorism, COVID-19, Islamic State, Instability, Iraq, Syria, Global, Resurgence

Procedia PDF Downloads 70
2963 Menstruating Bodies and Social Control – Insights From Dignity Without Danger: Collaboratively Analysing Menstrual Stigma and Taboos in Nepal

Authors: Sara Parker, Kay Standing

Abstract:

This paper will share insights into how menstruators bodies in Nepal are viewed and controlled in Nepal due to the deeply held stigmas and taboos that exist that frame menstrual blood as impure and polluting. It draws on a British Academy Global Challenges Research (BA/GCRF) funded project, ‘Dignity Without Danger,’ that ran from December 2019 to 2022. In Nepal, beliefs and myths around menstrual related practices prevail and vary in accordance to time, generation, caste and class. Physical seclusion and/or restrictions include the consumption of certain foods, the ability to touch certain people and objects, and restricted access to water sources. These restrictions not only put women at risk of poor health outcomes, but they also promote discrimination and challenge fundamental human rights. Despite the pandemic, a wealth of field research and creative outputs have been generated to help break the silence that surrounds menstruation and also highlights the complexity of addressing the harms associated with the exclusion from sacred and profane spaces that menstruators face. Working with locally recruited female research assistants, NGOS and brining together academics from the UK and Nepal, we explore the intersecting factors that impact on menstrual experiences and how they vary throughout Nepal. WE concur with Tamang that there is no such thing as a ‘Nepali Woman’, and there is no one narrative that captures the experiences of menstruators in Nepal. These deeply held beliefs and practices mean that menstruators are denied their right to a dignified menstruation. By being excluded from public and private spaces, such as temples and religious sites, as well as from kitchens and your own bedroom in your own home, these beliefs impact on individuals in complex and interesting ways. Existing research in Nepal by academics and activists demonstrates current programmes and initiatives do not fully address the misconceptions that underpin the exclusionary practices impacting on sexual and reproductive health, a sense of well being and highlight more work is needed in this area. Research has been conducted in all 7 provinces and through exploring and connecting disparate stories, artefacts and narratives, we will deepen understanding of the complexity of menstrual practices enabling local stakeholders to challenge exclusionary practices. By using creative methods to engage with stakeholders and share our research findings as well as highlighting the wealth of activism in Nepal. We highlight the importance of working with local communities, leaders and cutting across disciplines and agencies to promote menstrual justice and dignity. Our research findings and creative outputs that we share on social media channels such as Dignity Without Danger Facebook, Instagram and you tube stress the value of employing a collaborative action research approach to generate material which helps local people take control of their own narrative and change social relations that lead to harmful practices.

Keywords: menstruation, Nepal, stigma, social norms

Procedia PDF Downloads 62
2962 Sonic Therapeutic Intervention for Preventing Financial Fraud: A Phenomenological Study

Authors: Vasudev Das

Abstract:

In a global survey of more than 5,000 participants in 99 territories, PwC found a loss of $42 billion through fraud in the last 24 months. The specific problem is that private and public organizational leaders often do not understand the importance of sonic therapeutic intervention in preventing financial fraud. The study aimed to explore sonic therapeutic intervention practitioners' lived experiences regarding the value of sonic therapeutic intervention in preventing financial fraud. The data collection methods were semi-structured interviews of purposeful samples and documentary reviews, which were analyzed thematically. Four themes emerged from the analysis of interview transcription data: Sonic therapeutic intervention enabled self-control, pro-spiritual values, consequentiality mindset, and post-conventional consciousness. The itemized four themes helped non-engagement in financial fraud. Implications for positive social change include enhanced financial fraud management, more significant financial leadership, and result-oriented decision-taking in the financial market. Also, the study results can improve the increased de-escalation of anxiety/stress associated with defrauding.

Keywords: consciousness, consequentiality, rehabilitation, reintegration

Procedia PDF Downloads 157
2961 Using iPads and Tablets in Language Teaching and Learning Process

Authors: Ece Sarigul

Abstract:

It is an undeniable fact that, teachers need new strategies to communicate with students of the next generation and to shape enticing educational experiences for them. Many schools have launched iPad/ Tablets initiatives in an effort to enhance student learning. Despite their rapid adoption, the extent to which iPads / Tablets increase student engagement and learning is not well understood. This presentation aims to examine the use of iPads and Tablets in primary and high schools in Turkey as well as in the world to increase academic achievement through promotion of higher order thinking skills. In addition to explaining the ideas of school teachers and students who use the specific iPads or Tablets , various applications in schools and their use will be discussed and demonstrated in this study. The specific” iPads or Tablets” applications discussed in this presentation can be incorporated into the curriculum to assist in developing transformative practices and programs to meet the needs of a diverse student population. In the conclusion section of the presentation, there will be some suggestions for teachers about the effective use of technological devices in the classroom. This study can help educators understand better how students are currently using iPads and Tablets and shape future use.

Keywords: ipads, language teaching, tablets, technology

Procedia PDF Downloads 251
2960 Automatic Aggregation and Embedding of Microservices for Optimized Deployments

Authors: Pablo Chico De Guzman, Cesar Sanchez

Abstract:

Microservices are a software development methodology in which applications are built by composing a set of independently deploy-able, small, modular services. Each service runs a unique process and it gets instantiated and deployed in one or more machines (we assume that different microservices are deployed into different machines). Microservices are becoming the de facto standard for developing distributed cloud applications due to their reduced release cycles. In principle, the responsibility of a microservice can be as simple as implementing a single function, which can lead to the following issues: - Resource fragmentation due to the virtual machine boundary. - Poor communication performance between microservices. Two composition techniques can be used to optimize resource fragmentation and communication performance: aggregation and embedding of microservices. Aggregation allows the deployment of a set of microservices on the same machine using a proxy server. Aggregation helps to reduce resource fragmentation, and is particularly useful when the aggregated services have a similar scalability behavior. Embedding deals with communication performance by deploying on the same virtual machine those microservices that require a communication channel (localhost bandwidth is reported to be about 40 times faster than cloud vendor local networks and it offers better reliability). Embedding can also reduce dependencies on load balancer services since the communication takes place on a single virtual machine. For example, assume that microservice A has two instances, a1 and a2, and it communicates with microservice B, which also has two instances, b1 and b2. One embedding can deploy a1 and b1 on machine m1, and a2 and b2 are deployed on a different machine m2. This deployment configuration allows each pair (a1-b1), (a2-b2) to communicate using the localhost interface without the need of a load balancer between microservices A and B. Aggregation and embedding techniques are complex since different microservices might have incompatible runtime dependencies which forbid them from being installed on the same machine. There is also a security concern since the attack surface between microservices can be larger. Luckily, container technology allows to run several processes on the same machine in an isolated manner, solving the incompatibility of running dependencies and the previous security concern, thus greatly simplifying aggregation/embedding implementations by just deploying a microservice container on the same machine as the aggregated/embedded microservice container. Therefore, a wide variety of deployment configurations can be described by combining aggregation and embedding to create an efficient and robust microservice architecture. This paper presents a formal method that receives a declarative definition of a microservice architecture and proposes different optimized deployment configurations by aggregating/embedding microservices. The first prototype is based on i2kit, a deployment tool also submitted to ICWS 2018. The proposed prototype optimizes the following parameters: network/system performance, resource usage, resource costs and failure tolerance.

Keywords: aggregation, deployment, embedding, resource allocation

Procedia PDF Downloads 201
2959 Establishing Taiwan's Marine Space Planning System

Authors: Wen-Yan Chiau

Abstract:

Taiwan passed the 'Basic Ocean Act' in November 2019, and in accordance with Article 4 of its provisions, the government should draft a decree on ocean space planning (MSP). In the past few years, although Taiwan has passed the 'Coastal Zone Management Act' and the 'Spatial Planning Act', in the face of multiple use of marine areas, it still lacks a comprehensive marine area use blueprint and a fundamental mechanism for multi-purpose use planning management. In particular, Taiwan's active development of offshore wind power is facing this problem, and it is impossible to fully reconcile the use of each domain and the public welfare through a holistic system, highlighting the urgency of the establishment of MSP system. Therefore, this article will review relevant Taiwan laws and regulations, refer to important international initiatives and experiences, and participate in the exchange of practical experience in international conference(s), and propose adequate framework, principles, procedures, and promotion strategies on MSP. Possible solutions to promote sustainable and wise use in Taiwan's waters will also be suggested for comments.

Keywords: basic ocean act, coastal zone management act, marine spatial planning, spatial planning act, Taiwan

Procedia PDF Downloads 131
2958 Model Estimation and Error Level for Okike’s Merged Irregular Transposition Cipher

Authors: Okike Benjamin, Garba E. J. D.

Abstract:

The researcher has developed a new encryption technique known as Merged Irregular Transposition Cipher. In this cipher method of encryption, a message to be encrypted is split into parts and each part encrypted separately. Before the encrypted message is transmitted to the recipient(s), the positions of the split in the encrypted messages could be swapped to ensure more security. This work seeks to develop a model by considering the split number, S and the average number of characters per split, L as the message under consideration is split from 2 through 10. Again, after developing the model, the error level in the model would be determined.

Keywords: merged irregular transposition, error level, model estimation, message splitting

Procedia PDF Downloads 305
2957 Iterative Design Process for Development and Virtual Commissioning of Plant Control Software

Authors: Thorsten Prante, Robert Schöch, Ruth Fleisch, Vaheh Khachatouri, Alexander Walch

Abstract:

The development of industrial plant control software is a complex and often very expensive task. One of the core problems is that a lot of the implementation and adaptation work can only be done after the plant hardware has been installed. In this paper, we present our approach to virtually developing and validating plant-level control software of production plants. This way, plant control software can be virtually commissioned before actual ramp-up of a plant, reducing actual commissioning costs and time. Technically, this is achieved by linking the actual plant-wide process control software (often called plant server) and an elaborate virtual plant model together to form an emulation system. Method-wise, we are suggesting a four-step iterative process with well-defined increments and time frame. Our work is based on practical experiences from planning to commissioning and start-up of several cut-to-size plants.

Keywords: iterative system design, virtual plant engineering, plant control software, simulation and emulation, virtual commissioning

Procedia PDF Downloads 483
2956 Planning and Implementing Large-Scale Ecological Connectivity: A Review of Past and Ongoing Practices in Turkey

Authors: Tutku Ak, A. Esra Cengiz, Çiğdem Ayhan Kaptan

Abstract:

The conservation community has been increasingly promoting the concept of ecological connectivity towards the prevention and mitigation of landscape fragmentation. Many tools have been proposed for this purpose in not only Europe, but also around the world. Spatial planning for building connectivity, however, has many problems associated with the complexity of ecological processes at spatial and temporal scales. Furthermore, on the ground implementation could be very difficult potentially leading to ecologically disastrous results and waste of resources. These problems, on the other hand, can be avoided or rectified as more experience is gained with implementation. Therefore, it is the objective of this study to document the experiences gained with connectivity planning in Turkish landscapes. This paper is a preliminary review of the conservation initiatives and projects aimed at protecting and building ecological connectivity in and around Turkey. The objective is to scope existing conservation plans, tools and implementation approaches in Turkey and the ultimate goal is to understand to what degree they have been implemented and what are the constraints and opportunities that are being faced.

Keywords: ecological connectivity, large-scale landscapes, planning and implementation, Turkey

Procedia PDF Downloads 498
2955 Insider Theft Detection in Organizations Using Keylogger and Machine Learning

Authors: Shamatha Shetty, Sakshi Dhabadi, Prerana M., Indushree B.

Abstract:

About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring.

Keywords: cyber security, machine learning, cyclic process, email notification

Procedia PDF Downloads 52
2954 Introducing Information and Communication Technologies in Prison: A Proposal in Favor of Social Reintegration

Authors: Carmen Rocio Fernandez Diaz

Abstract:

This paper focuses on the relevance of information and communication technologies (hereinafter referred as ‘ICTs’) as an essential part of the day-to-day life of all societies nowadays, as they offer the scenario where an immense number of behaviors are performed that previously took place in the physical world. In this context, areas of reality that have remained outside the so-called ‘information society’ are hardly imaginable. Nevertheless, it is possible to identify a means that continue to be behind this reality, and it is the penitentiary area regarding inmates rights, as security aspects in prison have already be improved by new technologies. Introducing ICTs in prisons is still a matter subject to great rejections. The study of comparative penitentiary systems worldwide shows that most of them use ICTs only regarding educational aspects of life in prison and that communications with the outside world are generally based on traditional ways. These are only two examples of the huge range of activities where ICTs can carry positive results within the prison. Those positive results have to do with the social reintegration of persons serving a prison sentence. Deprivation of liberty entails contact with the prison subculture and the harmful effects of it, causing in cases of long-term sentences the so-called phenomenon of ‘prisonization’. This negative effect of imprisonment could be reduced if ICTs were used inside prisons in the different areas where they can have an impact, and which are treated in this research, as (1) access to information and culture, (2) basic and advanced training, (3) employment, (4) communication with the outside world, (5) treatment or (6) leisure and entertainment. The content of all of these areas could be improved if ICTs were introduced in prison, as it is shown by the experience of some prisons of Belgium, United Kingdom or The United States. However, rejections to introducing ICTs in prisons obey to the fact that it could carry also risks concerning security and the commission of new offences. Considering these risks, the scope of this paper is to offer a real proposal to introduce ICTs in prison, trying to avoid those risks. This enterprise would be done to take advantage of the possibilities that ICTs offer to all inmates in order to start to build a life outside which is far from delinquency, but mainly to those inmates who are close to release. Reforming prisons in this sense is considered by the author of this paper an opportunity to offer inmates a progressive resettlement to live in freedom with a higher possibility to obey the law and to escape from recidivism. The value that new technologies would add to education, employment, communications or treatment to a person deprived of liberty constitutes a way of humanization of prisons in the 21st century.

Keywords: deprivation of freedom, information and communication technologies, imprisonment, social reintegration

Procedia PDF Downloads 161
2953 Examples from a Traditional Sismo-Resistant Architecture

Authors: Amira Zatir, Abderahmane Mokhtari, Amina Foufa, Sara Zatir

Abstract:

It exists in several regions in the world, of numerous historic monuments, buildings and housing environment, built in traditional ways which survive for earthquakes, even in zones where the seismic risk is particularly raised. These constructions, stemming from vernacular architecture, allow, through their resistances in the time earthquakes, to identify the various sismo-resistant "local" techniques. Through the examples and the experiences presented, the remark which can be made, is that in the traditional built, two major principles in a way opposite, govern the constructions in earthquake-resistant. It is about the very big flexibility, whom answer very light constructions, like the Japanese wooden constructions, Turkish and even Chinese; that of the very big rigidity to which correspond constructions in masonry in particular stone, more or less heavy and massive, which we meet in particular in the Mediterranean Basin, and in the historic sanctuary of Machu Pacchu. In it sensible and well-reflected techniques of construction are added, of which the use of the humble materials such as the earth and the adobe. The ancient communities were able to face the seismic risks, thanks to them know-how reflected in their intelligently designed constructions, testifying of a local seismic culture.

Keywords: earthquake, architecture, traditional, construction, resistance

Procedia PDF Downloads 419
2952 Development of Enhanced Data Encryption Standard

Authors: Benjamin Okike

Abstract:

There is a need to hide information along the superhighway. Today, information relating to the survival of individuals, organizations, or government agencies is transmitted from one point to another. Adversaries are always on the watch along the superhighway to intercept any information that would enable them to inflict psychological ‘injuries’ to their victims. But with information encryption, this can be prevented completely or at worst reduced to the barest minimum. There is no doubt that so many encryption techniques have been proposed, and some of them are already being implemented. However, adversaries always discover loopholes on them to perpetuate their evil plans. In this work, we propose the enhanced data encryption standard (EDES) that would deploy randomly generated numbers as an encryption method. Each time encryption is to be carried out, a new set of random numbers would be generated, thereby making it almost impossible for cryptanalysts to decrypt any information encrypted with this newly proposed method.

Keywords: encryption, enhanced data encryption, encryption techniques, information security

Procedia PDF Downloads 145
2951 Implementing Fault Tolerance with Proxy Signature on the Improvement of RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on the improved RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.

Keywords: fault tolerance, improved RSA, key agreement, proxy signature

Procedia PDF Downloads 420
2950 The Potential for Maritime Tourism: An African Perspective

Authors: Lynn C. Jonas

Abstract:

The African continent is rich in coastal history, heritage, and culture, presenting immense potential for the development of maritime tourism. Shipping and its related components are generally associated with the maritime industry, and tourism’s link is to the various forms of nautical tourism. Activities may include cruising, yachting, visits to lighthouses, ports, harbors, and excursions to related sites of cultural, historical, or ecological significance. There have been hundreds of years of explorers leaving a string of shipwrecks along the various coastal areas on the continent in their pursuit of establishing trade routes between Europe, Africa, and the Far East. These shipwrecks present diving opportunities in artificial reefs and marine heritage to be explored in various ways in the maritime cultural zones. Along the South African coast, for example, six Portuguese shipwrecks highlight the Bartolomeu Dias legacy of exploration, and there are a number of warships in Tanzanian waters. Furthermore, decades of African countries being under colonized rule have left the continent with an intricate cultural heritage that is enmeshed in European language architecture interlinked with, in many instances, hard-fought independent littoral states. There is potential for coastal trails to be developed to follow these historical events as, at one point in history, France had colonized 35 African states, and subsequently, 32 African states were colonized by Britain. Countries such as Cameroon still have the legacy of Francophone versus Anglophone as a result of this shift in colonizers. Further to the colonized history of the African continent, there is an uncomfortable heritage of the slave trade history. To a certain extent, these coastal slave trade posts are being considered attractive to a niche tourism audience; however, there is potential for education and interpretive measures to grow this as a tourism product. Notwithstanding these potential opportunities, there are numerous challenges to consider, such as poor maritime infrastructure, maritime security concerns with issues such as piracy, transnational crimes including weapons and migrant smuggling, drug, and human trafficking. These and related maritime issues contribute to the concerns over the porous nature of African ocean gateways, adding to the security concerns for tourists. This theoretical paper will consider these trends and how they may contribute to the growth and development of maritime tourism on the African continent. African considerations of the growth potential of tourism in coastal and marine spaces are needed, particularly with a focus on embracing the continent's tumultuous past as part of its heritage. This has the potential to contribute to the creation of a sense of ownership of opportunities.

Keywords: coastal trade routes, maritime tourism, shipwrecks, slave trade routes

Procedia PDF Downloads 12
2949 Prosodic Characteristics of Post Traumatic Stress Disorder Induced Speech Changes

Authors: Jarek Krajewski, Andre Wittenborn, Martin Sauerland

Abstract:

This abstract describes a promising approach for estimating post-traumatic stress disorder (PTSD) based on prosodic speech characteristics. It illustrates the validity of this method by briefly discussing results from an Arabic refugee sample (N= 47, 32 m, 15 f). A well-established standardized self-report scale “Reaction of Adolescents to Traumatic Stress” (RATS) was used to determine the ground truth level of PTSD. The speech material was prompted by telling about autobiographical related sadness inducing experiences (sampling rate 16 kHz, 8 bit resolution). In order to investigate PTSD-induced speech changes, a self-developed set of 136 prosodic speech features was extracted from the .wav files. This set was adapted to capture traumatization related speech phenomena. An artificial neural network (ANN) machine learning model was applied to determine the PTSD level and reached a correlation of r = .37. These results indicate that our classifiers can achieve similar results to those seen in speech-based stress research.

Keywords: speech prosody, PTSD, machine learning, feature extraction

Procedia PDF Downloads 88
2948 Re-Invent Corporate Governance - Ethical Way

Authors: Talha Sareshwala

Abstract:

The purpose of this research paper is to help entrepreneurs build an environment of trust, transparency and accountability necessary for fostering long term investment, financial stability and business integrity and to guide future Entrepreneurs into a promising future. The study presents a broader review on Corporate Governance, starting from its definition and antecedents. This is the most important aspect of ethical business. In fact, the 3 main pillars of corporate governance are: Transparency; Accountability; Security. The combination of these 3 pillars in running a company successfully and forming solid professional relationships among its stakeholders, which includes key managerial employees and, most important, the shareholders This paper is sharing an experience how an entrepreneur can act as a catalyst while ensuring them that ethics and transparency do pay in business when followed in true spirit and action.

Keywords: business, entrepreneur, ethics, governance, transparency.

Procedia PDF Downloads 70