Search results for: European security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4407

Search results for: European security

1827 Cyber-Med: Practical Detection Methodology of Cyber-Attacks Aimed at Medical Devices Eco-Systems

Authors: Nir Nissim, Erez Shalom, Tomer Lancewiki, Yuval Elovici, Yuval Shahar

Abstract:

Background: A Medical Device (MD) is an instrument, machine, implant, or similar device that includes a component intended for the purpose of the diagnosis, cure, treatment, or prevention of disease in humans or animals. Medical devices play increasingly important roles in health services eco-systems, including: (1) Patient Diagnostics and Monitoring; Medical Treatment and Surgery; and Patient Life Support Devices and Stabilizers. MDs are part of the medical device eco-system and are connected to the network, sending vital information to the internal medical information systems of medical centers that manage this data. Wireless components (e.g. Wi-Fi) are often embedded within medical devices, enabling doctors and technicians to control and configure them remotely. All these functionalities, roles, and uses of MDs make them attractive targets of cyber-attacks launched for many malicious goals; this trend is likely to significantly increase over the next several years, with increased awareness regarding MD vulnerabilities, the enhancement of potential attackers’ skills, and expanded use of medical devices. Significance: We propose to develop and implement Cyber-Med, a unique collaborative project of Ben-Gurion University of the Negev and the Clalit Health Services Health Maintenance Organization. Cyber-Med focuses on the development of a comprehensive detection framework that relies on a critical attack repository that we aim to create. Cyber-Med will allow researchers and companies to better understand the vulnerabilities and attacks associated with medical devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The Cyber-Med detection framework will consist of two independent, but complementary detection approaches: one for known attacks, and the other for unknown attacks. These modules incorporate novel ideas and algorithms inspired by our team's domains of expertise, including cyber security, biomedical informatics, and advanced machine learning, and temporal data mining techniques. The establishment and maintenance of Cyber-Med’s up-to-date attack repository will strengthen the capabilities of Cyber-Med’s detection framework. Major Findings: Based on our initial survey, we have already found more than 15 types of vulnerabilities and possible attacks aimed at MDs and their eco-system. Many of these attacks target individual patients who use devices such pacemakers and insulin pumps. In addition, such attacks are also aimed at MDs that are widely used by medical centers such as MRIs, CTs, and dialysis engines; the information systems that store patient information; protocols such as DICOM; standards such as HL7; and medical information systems such as PACS. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched against MDs. Very little research has been conducted in order to protect these devices from cyber-attacks, since most of the development and engineering efforts are aimed at the devices’ core medical functionality, the contribution to patients’ healthcare, and the business aspects associated with the medical device.

Keywords: medical device, cyber security, attack, detection, machine learning

Procedia PDF Downloads 359
1826 Exploring the Changes in the Publishing of Scientific Journals in the Age of Digital Transformation as the Main Measure for Scientific Communication

Authors: Arūnas Gudinavičius

Abstract:

The historiography of scholarly journals in Eastern Europe is fragmented, and so far, the development of scholarly journals in Eastern Europe has not been studied from a publishing point of view in the context of scientific communication. There are only a few general articles on the period before World War II; also, there is hardly any systematic and publicly available information about the Soviet period and the situation of scientific communication in Eastern Europe at the end of the XX century and the beginning of the XXI century. There is a lack of research data on scholarly journals in Lithuania. The existing researches focuses mostly on the specific needs of academic institutions. The publication of scientific journals and papers is analyzed as a part of the scientific communication circle. Formal science communication from the point of view that it is the results formed in the course of communication are examined, which are necessarily characterized by long-term access to a large circle of users. Improved model of scientific communication by supplementing the dissemination of research results with formal and informal communication channels is used, according to which the scientific communication system forms the essence of science, where the social, lasting value of science and the dissemination of scientific results to scientists and the public are the most important. The model covers the science communication process from research initiation to journal publication and citation. We are focusing on the publishing and dissemination stages of the model of scientific communication. The paper is to systematize and analyze the various types of scientific journal publishers from 1907 until 2020 as a means of formal documentary communication in the context of all scientific communication. The research analyses the case of a small European country and presents chronological and geographical characteristics of the publication of scientific periodicals, analyzes the publishers of scientific periodicals and their activities, publishing formats, and dissemination methods.

Keywords: scientific communication, scientific periodicals, scientific journals, publishing

Procedia PDF Downloads 81
1825 Appearance of Ciguatoxin Fish in Atlantic Europe Waters

Authors: J. Bravo, F. Cabrera Suárez, B. Vega, L. Román, M. Martel, F. Acosta

Abstract:

Ciguatera fish poisoning (CFP) is the most common non-bacterial intoxication in the world caused by ingestion of fish with bio-accumulated ciguatoxins (CTXs). It is typical in tropical and subtropical areas, mainly affecting the Caribbean Sea, Polynesia and other areas in the Pacific and Indian Oceans. Interest in Europe by the CFP is increasing in recent years as more and more cases in European hospitals are appearing, usually by people who have consumed ciguatoxin imported fish or have travelled to areas of risk for this poisoning. Since 2004 a series of poisonings raised the question of a possible occurrence of ciguatoxin in Europe, especially in the area of Macaronesia in the East Atlantic temperate zone. Furthermore, some studies have identified the presence of Gambierdiscus spp. in waters surrounding the Canary Islands and Madeira, a toxic dinoflagellate related to this poisoning. The toxin accumulates and concentrates through the food chain and affects to the end of the chain, the human consumer. Fish were collected from the Canary Islands waters and the toxin has been extracted and purified by using acetone and liquid/liquid partition in order to eliminate the excess of fatty acids that may interfere with the detection of the toxin. The fish extracts were inoculated in Neuroblastoma (neuro-2a) cells. After 24-h cell viability was used as an endpoint for cytotoxic effects measurement. Since 2011 our laboratory is collecting data for species such Seriola spp., Epinephelus spp., Makaira spp., Pomatomus spp., Xiphias spp., and Acantocybium spp., from all islands and including the sports fishing and professional activities, we obtained a 8% of fish that have ciguatoxin in their muscle. With these results, we conclude that the island where fishing and fish size affects the probability of catching a fish with the ciguatoxin.

Keywords: Canary Islands, ciguatera fish poisoning, ciguatoxin, Europe

Procedia PDF Downloads 352
1824 Selectivity Mechanism of Cobalt Precipitation by an Imidazole Linker From an Old Battery Solution

Authors: Anna-Caroline Lavergne-Bril, Jean-François Colin, David Peralta, Pascale Maldivi

Abstract:

Cobalt is a critical material, widely used in Li-ion batteries. Due to the planned electrification of European vehicles, cobalt needs are expending – and resources are limited. To meet the needs in cobalt to come, it is necessary to develop new efficient ways to recycle cobalt. One of the biggest sources comes from old electrical vehicles batteries (batteries sold in 2019: 500 000 tons of waste to be). A closed loop process of cobalt recycling has been developed and this presentation aims to present the selectivity mechanism of cobalt over manganese and nickel in solution. Cobalt precipitation as a ZIF material (Zeolitic Imidazolate framework) from a starting solution composed of equimolar nickel, manganese and cobalt is studied. A 2-MeIm (2-methylimidazole) linker is introduced in a multimetallic Ni, Mn, Co solution and the resulting ZIF-67 is 100% pure Co among its metallic centers. Selectivity of Co over Ni is experimentally studied and DFT modelisation calculation are conducted to understand the geometry of ligand-metal-solvent complexes in solution. Selectivity of Co over Mn is experimentally studied, and DFT modelisation calcucation are conducted to understand the link between pKa of the ligand and precipitration of Mn impurities within the final material. Those calculation open the way to other ligand being used in the same process, with more efficiency. Experimental material are synthetized from bimetallic (Ni²⁺/Co²⁺, Mn²⁺/Co²⁺, Mn²⁺/Ni²⁺) solutions. Their crystallographic structure is analysed by XRD diffraction (Brüker AXS D8 diffractometer, Cu anticathode). Morphology is studied by scanning electron microscopy, using a LEO 1530 FE-SEM microscope. The chemical analysis is performed by using ICP-OES (Agilent Technologies 700 series ICP-OES). Modelisation calculation are DFT calculation (density functional theory), using B3LYP, conducted with Orca 4.2.

Keywords: MOFs, ZIFs, recycling, closed-loop, cobalt, li-ion batteries

Procedia PDF Downloads 141
1823 Material Vitalism’s Potential Role in Informing EU Construction and Demolition Waste Policy

Authors: Cameron Jones

Abstract:

Emissions, produced by landfill waste from demolished obsolete buildings, have a damaging effect on both the Earth’s climate and human health. The philosophical theory of material vitalism - the potential for materials to react and emit harmful pollutants - therefore defines this construction and demolition waste (CDW) as having vitality. The European Union’s ‘Circular Economic Action Plan’ (CEAP) aims to mitigate the effects of CDW by prioritising the circularity of building materials. This dissertation examines how the philosophical theory of material vitalism can make an environmentally responsible contribution to CDW policy. The CEAP and Silvertown Quays development are used as case studies for the application of vitalism to policy revision. The study concludes that vitalism has a positive role to play in informing CDW policy, although its contribution is stronger in some areas. This is established by first appraising the aspects that relate to the obsolescence of buildings outlined in the EU’s existing CDW policies. Next, these policy directives are compared with the CE principles employed in the Silvertown Quays development. Subsequently, a keyword analysis model is used to categorise the language used in the CEAP, demonstrating how socio-political approaches to the CE and strategies to address resource scarcity could be strengthened to represent the EU’s policy aspirations more effectively. Recommendations are then made on how material vitalism could be utilised to strengthen legislation, arguing that a notable contribution can be made in most policy areas. Finally, theoretical testing of the impact of these revisions to policy on the case study development identified some practicalities for consideration in improving waste management outcomes.

Keywords: vitalism, construction waste, obsolescence, political ecology, exceptionalism

Procedia PDF Downloads 46
1822 A Survey on Countermeasures of Cache-Timing Attack on AES Systems

Authors: Settana M. Abdulh, Naila A. Sadalla, Yaseen H. Taha, Howaida Elshoush

Abstract:

Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures.

Keywords: AES algorithm, side channel attack, cache timing attack, cache timing countermeasure

Procedia PDF Downloads 303
1821 The Effect of Artificial Intelligence on Human Rights Legislations and Evolution

Authors: Nawal Yacoub Halim Abdelmasih

Abstract:

The link between terrorism and human rights has grown to be a chief challenge in the combat against terrorism around the sector. This is primarily based on the truth that terrorism and human rights are so closely related that after the former starts, the latter is violated. This direct connection is identified in the Vienna Declaration and program of movement adopted by way of the sector Convention on Human Rights in Vienna on June 25, 1993, which acknowledges that acts of terrorism in all their paperwork and manifestations intended to damage the human rights of people. Terrorism, therefore, represents an assault on our maximum fundamental human rights. To this stop, the first part of this article makes a specialty of the connections between terrorism and human rights and seeks to spotlight the interdependence between those two standards. The second part discusses the rising idea of cyberterrorism and its manifestations. An evaluation of the fight against cyberterrorism inside the context of human rights is likewise performed.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 16
1820 A Facile Nanocomposite of Graphene Oxide Reinforced Chitosan/Poly-Nitroaniline Polymer as a Highly Efficient Adsorbent for Extracting Polycyclic Aromatic Hydrocarbons from Tea Samples

Authors: Adel M. Al-Shutairi, Ahmed H. Al-Zahrani

Abstract:

Tea is a popular beverage drunk by millions of people throughout the globe. Tea has considerable health advantages, in-cluding antioxidant, antibacterial, antiviral, chemopreventive, and anticarcinogenic properties. As a result of environmental pollution (atmospheric deposition) and the production process, tealeaves may also include a variety of dangerous substances, such as polycyclic aromatic hydrocarbons (PAHs). In this study, graphene oxide reinforced chitosan/poly-nitroaniline polymer was prepared to develop a sensitive and reliable solid phase extraction method (SPE) for extraction of PAH7 in tea samples, followed by high-performance liquid chromatography- fluorescence detection. The prepared adsorbent was validated in terms of linearity, the limit of detection, the limit of quantification, recovery (%), accuracy (%), and precision (%) for the determination of the PAH7 (benzo[a]pyrene, benzo[a]anthracene, benzo[b]fluoranthene, chrysene, benzo[b]fluoranthene, Dibenzo[a,h]anthracene and Benzo[g,h,i]perylene) in tea samples. The concentration was determined in two types of tea commercially available in Saudi Arabia, including black tea and green tea. The maximum mean of Σ7PAHs in black tea samples was 68.23 ± 0.02 ug kg-1 and 26.68 ± 0.01 ug kg-1 in green tea samples. The minimum mean of Σ7PAHs in black tea samples was 37.93 ± 0.01 ug kg-1 and 15.26 ± 0.01 ug kg-1 in green tea samples. The mean value of benzo[a]pyrene in black tea samples ranged from 6.85 to 12.17 ug kg-1, where two samples exceeded the standard level (10 ug kg-1) established by the European Union (UE), while in green tea ranged from 1.78 to 2.81 ug kg-1. Low levels of Σ7PAHs in green tea samples were detected in comparison with black tea samples.

Keywords: polycyclic aromatic hydrocarbons, CS, PNA and GO, black/green tea, solid phase extraction, Saudi Arabia

Procedia PDF Downloads 100
1819 Physicochemical Characterization of Peptides Isolated from Vigna unguiculata

Authors: Sonaal Ramsookmohan

Abstract:

Legume seeds are common foods in human diet and have been identied as a valuable source of human nutritonn Since they are useful sources of protein; legume proteins are used in many food applicatonsn Critcal functonal propertes are recognized to impact the quality of foodn Cowpea (Vigna unguiculata), has been well documented for its immense potental in contributng to food security forming part of daily staple diets in most developing countriesn. In this study, cowpea seeds were used to prepare cowpea four, protein isolates by the salt extractonndialysis method and peptdes by enzymatc hydrolysis using Alcalase and Flavourzymen Functonal analyses such as water absorpton capacity, oil absorpton capacity, emulsifying and foaming propertes were conducted on the cowpea peptdesn The physicochemical propertes determine their potental applicaton in food industries as functonal ingredientsn Cowpea peptdes could increase the value of cowpea by expanding its use, as well as contribute to the legume grain sector.

Keywords: physicochemical, peptides, Cowpea, alcalase, flavourzyme

Procedia PDF Downloads 79
1818 Life-Saving Design Strategies for Nursing Homes and Long-Term Care Facilities

Authors: Jason M. Hegenauer, Nicholas Fucci

Abstract:

In the late 1990s, a major deinstitutionalization movement of elderly patients took place, since which, the design of long-term care facilities has not been adequately analyzed in the United States. Over the course of the last 25 years, major innovations in construction methods, technology, and medicine have been developed, drastically changing the landscape of healthcare architecture. In light of recent events, and the expected increase in elderly populations with the aging of the baby-boomer generation, it is evident that reconsideration of these facilities is essential for the proper care of aging populations. The global response has been effective in stifling this pandemic; however, widespread disease still poses an imminent threat to the human race. Having witnessed the devastation Covid-19 has reaped throughout nursing homes and long-term care facilities, it is evident that the current strategies for protecting our most vulnerable populations are not enough. Light renovation of existing facilities and previously overlooked considerations for new construction projects can drastically lower the risk at nursing homes and long-term care facilities. A reconfigured entry sequence supplements several of the features which have been long-standing essentials of the design of these facilities. This research focuses on several aspects identified as needing improvement, including indoor environment quality, security measures incorporated into healthcare architecture and design, and architectural mitigation strategies for sick building syndrome. The results of this study have been compiled as 'best practices' for the design of future healthcare construction projects focused on the health, safety, and quality of life of the residents of these facilities. These design strategies, which can easily be implemented through renovation of existing facilities and new construction projects, minimize risk of infection and spread of disease while allowing routine functions to continue with minimal impact, should the need for future lockdowns arise. Through the current lockdown procedures, which were implemented during the Covid-19 pandemic, isolation of residents has caused great unrest and worry for family members and friends as they are cut off from their loved ones. At this time, data is still being reported, leaving infection and death rates inconclusive; however, recent projections in some states list long-term care facility deaths as high as 60% of all deaths in the state. The population of these facilities consists of residents who are elderly, immunocompromised, and have underlying chronic medical conditions. According to the Centers for Disease Control, these populations are particularly susceptible to infection and serious illness. The obligation to protect our most vulnerable population cannot be overlooked, and the harsh measures recently taken as a response to the Covid-19 pandemic prove that the design strategies currently utilized for doing so are inadequate.

Keywords: building security, healthcare architecture and design, indoor environment quality, new construction, sick building syndrome, renovation

Procedia PDF Downloads 100
1817 Assessment Of Factors Affecting Sustainability of Rice (Oryza sativa) Processing and Marketing in Ogun State, Nigeria

Authors: A. M. Omoare, O. O. Sofowora, W. O. Oyediran

Abstract:

The study was carried out to assess the factors affecting the sustainability of rice processing and marketing in Ogun State, Nigeria. Multi-stage sampling technique was used to select one hundred and twenty (120) respondents for the study. Descriptive statistics was used to describe the objectives while hypotheses were analyzed with Pearson Product Moment Correlation. The result showed that most (85%) of the respondents was less than 50 years old and had been in rice business for more than 6 years. The majority (66.67%) of the respondents got their capitals from cooperative societies. All (100%) the respondents used rice as household food security and source of income. However, efficient rice processing and marketing were affected by inadequate manpower capacity development and inputs. There was a positive and significant relationship between socio-economic characteristics and processing techniques (p < 0.05). It is hereby recommended that extension service providers should introduce improved rice processing systems to the rice millers traders in the study area.

Keywords: sustainability, rice processing, marketing, constraints, millers traders

Procedia PDF Downloads 399
1816 A Review of Protocols and Guidelines Addressing the Exposure of Occupants to Electromagnetic Field (EMF) Radiation in Buildings

Authors: Shabnam Monadizadeh, Charles Kibert, Jiaxuan Li, Janghoon Woo, Ashish Asutosh, Samira Roostaei, Maryam Kouhirostami

Abstract:

A significant share of the technology that has emerged over the past several decades produces electromagnetic field (EMF) radiation. Communications devices, household appliances, industrial equipment, and medical devices all produce EMF radiation with a variety of frequencies, strengths, and ranges. Some EMF radiation, such as Extremely Low Frequency (ELF), Radio Frequency (RF), and the ionizing range have been shown to have harmful effects on human health. Depending on the frequency and strength of the radiation, EMF radiation can have health effects at the cellular level as well as at brain, nervous, and cardiovascular levels. Health authorities have enacted regulations locally and globally to set critical values to limit the adverse effects of EMF radiation. By introducing a more comprehensive field of EMF radiation study and practice, architects and designers can design for a safer electromagnetic (EM) indoor environment, and, as building and construction specialists, will be able to monitor and reduce EM radiation. This paper identifies the nature of EMF radiation in the built environment, the various EMF radiation sources, and its human health effects. It addresses European and US regulations for EMF radiation in buildings and provides a preliminary action plan. The challenges of developing measurement protocols for the various EMF radiation frequency ranges and determining the effects of EMF radiation on building occupants are discussed. This paper argues that a mature method for measuring EMF radiation in building environments and linking these measurements to human health impacts occupant health should be developed to provide adequate safeguards for human occupants of buildings for future research.

Keywords: biological affection, electromagnetic field, building regulation, human health, healthy building, clean construction

Procedia PDF Downloads 188
1815 Design and Development of a Computerized Medical Record System for Hospitals in Remote Areas

Authors: Grace Omowunmi Soyebi

Abstract:

A computerized medical record system is a collection of medical information about a person that is stored on a computer. One principal problem of most hospitals in rural areas is using the file management system for keeping records. A lot of time is wasted when a patient visits the hospital, probably in an emergency, and the nurse or attendant has to search through voluminous files before the patient's file can be retrieved; this may cause an unexpected to happen to the patient. This data mining application is to be designed using a structured system analysis and design method which will help in a well-articulated analysis of the existing file management system, feasibility study, and proper documentation of the design and implementation of a computerized medical record system. This computerized system will replace the file management system and help to quickly retrieve a patient's record with increased data security, access clinical records for decision-making, and reduce the time range at which a patient gets attended to.

Keywords: programming, data, software development, innovation

Procedia PDF Downloads 93
1814 Challenges of Sustainable Development of Small and Medium-Sized Enterprises in Georgia

Authors: Kharaishvili Eteri

Abstract:

The article highlights the importance of small and medium-sized enterprises in achieving the goals of sustainable development of the economy and increasing the well-being of the population. The opinion is put forward that it is necessary to adapt the activities of small and medium-sized firms in Georgia to sustainable business models. Therefore, it is important to identify the challenges that will ensure compliance with the goals and requirements of sustainable development of small and mediumsized enterprises. Objectives. The goal of the study is to reveal the challenges of sustainable development in small and medium-sized enterprises in Georgia and to develop recommendations for strategic development opportunities. Methodologies The challenges of sustainable development of small and medium-sized enterprises are investigated with the following methodology: bibliographic research of scientific works and reports of organizations is carried out; Based on the grouping of sustainable development goals, the performance indicators of these goals are studied; Differences with respect to the corresponding indicators of European countries are determined by the comparison method; The matrix scheme establishes the conditions and tools for sustainable development; Challenges of sustainable development are identified by factor analysis. Contributions Trends in the sustainable development of small and medium-sized enterprises are studied from the point of view of economic, social and environmental factors; To ensure sustainability, the conditions and tools for sustainable development are established (certified supply chains and global markets, allocation of financial resources necessary for sustainable development, proper public procurement, highly qualified workforce, etc.); Several main challenges have been identified in the sustainable development of small and medium-sized enterprises, including: limited internal resources; Institutional factors, especially vague and imperfect regulations, bureaucracy; low level of investments; Low level of qualification of human capital and others.

Keywords: small and medium-sized enterprises, sustainable development, conditions of sustainable development, strategic directions of sustainable development.

Procedia PDF Downloads 109
1813 Natural Hazards and Their Costs in Albanian Part of Ohrid Graben

Authors: Mentor Sulollari

Abstract:

Albania, according to (UNU-EHS) United Nations University, Institute for Environment and Human Security studies for 2015, is listed as the number one country in Europe for the possibility to be caught by natural catastrophes. This is conditioned by unstudied human activity, which has seriously damaged the environment. Albanian part of Ohrid graben that lies in Southeast of Albania, is endangered by landslides and floods, as a result of uncontrolled urban development and low level of investment in infrastructure, rugged terrain in its western part and capricious climate caused by global warming. To be dealt with natural disasters, which cause casualties and material damage, it is important to study them in order to anticipate and reduce damages in future. As part of this study is the construction of natural hazards map, which show us where they are distributed, and which are the vulnerable areas. This article will also be dealing with socio-economic and environmental costs of those events and what are the measures to be taken to reduce them.

Keywords: flooding, landslides, natural catastrophes mapping, Pogradec, lake Ohrid, Albanian part of Ohrid graben

Procedia PDF Downloads 301
1812 Survey on Malware Detection

Authors: Doaa Wael, Naswa Abdelbaky

Abstract:

Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.

Keywords: malware analysis, blockchain, malware attacks, malware detection approaches

Procedia PDF Downloads 90
1811 Methodology of the Turkey’s National Geographic Information System Integration Project

Authors: Buse A. Ataç, Doğan K. Cenan, Arda Çetinkaya, Naz D. Şahin, Köksal Sanlı, Zeynep Koç, Akın Kısa

Abstract:

With its spatial data reliability, interpretation and questioning capabilities, Geographical Information Systems make significant contributions to scientists, planners and practitioners. Geographic information systems have received great attention in today's digital world, growing rapidly, and increasing the efficiency of use. Access to and use of current and accurate geographical data, which are the most important components of the Geographical Information System, has become a necessity rather than a need for sustainable and economic development. This project aims to enable sharing of data collected by public institutions and organizations on a web-based platform. Within the scope of the project, INSPIRE (Infrastructure for Spatial Information in the European Community) data specifications are considered as a road-map. In this context, Turkey's National Geographic Information System (TUCBS) Integration Project supports sharing spatial data within 61 pilot public institutions as complied with defined national standards. In this paper, which is prepared by the project team members in the TUCBS Integration Project, the technical process with a detailed methodology is explained. In this context, the main technical processes of the Project consist of Geographic Data Analysis, Geographic Data Harmonization (Standardization), Web Service Creation (WMS, WFS) and Metadata Creation-Publication. In this paper, the integration process carried out to provide the data produced by 61 institutions to be shared from the National Geographic Data Portal (GEOPORTAL), have been trying to be conveyed with a detailed methodology.

Keywords: data specification, geoportal, GIS, INSPIRE, Turkish National Geographic Information System, TUCBS, Turkey's national geographic information system

Procedia PDF Downloads 148
1810 Financing Innovation: Differences across National Innovation Systems

Authors: Núria Arimany Serrat, Xavier Ferràs Hernández, Petra A. Nylund, Eric Viardot

Abstract:

Innovation is an increasingly important antecedent to firm competitiveness and growth. Successful innovation, however, requires a significant financial commitment and the means of financing accessible to the firm may affect its ability to innovate. The access to equity financing such as venture capital has been connected to innovativeness for young firms. For established enterprises, debt financing of innovation may be a more realistic option. Continuous innovation and growth would otherwise require a constant increase of equity. We, therefore, investigate the relation between debt financing and innovation for large firms and hypothesize that those firms that carry more debt will be more innovative. The need for debt financing of innovation may be reduced for very profitable firms, which can finance innovation with cash flow. We thus hypothesize a moderating effect of profitability on the relationship between debt financing and innovation. We carry out an empirical investigation using a longitudinal data set including 167 large European firms over five years, resulting in 835 firm years. We apply generalized least squares (GLS) regression with fixed firm effects to control for firm heterogeneity. The findings support our hypotheses and we conclude that access to debt finding is an important antecedent of innovation, with profitability as a moderating factor. The results do however differ across national innovation systems and we find a strong relationship for British, Dutch, French, and Italian firms but not for German and Spanish entities. We discuss differences in the national systems of innovation and financing which contextualize the variations in the findings and thus make a nuanced contribution to the research in innovation financing. The cross-country differences calls for differentiated advice to managers, institutions, and researchers depending on the national context.

Keywords: innovation, R&D, national innovation systems, financing

Procedia PDF Downloads 534
1809 Integration of Wireless Sensor Networks and Radio Frequency Identification (RFID): An Assesment

Authors: Arslan Murtaza

Abstract:

RFID (Radio Frequency Identification) and WSN (Wireless sensor network) are two significant wireless technologies that have extensive diversity of applications and provide limitless forthcoming potentials. RFID is used to identify existence and location of objects whereas WSN is used to intellect and monitor the environment. Incorporating RFID with WSN not only provides identity and location of an object but also provides information regarding the condition of the object carrying the sensors enabled RFID tag. It can be widely used in stock management, asset tracking, asset counting, security, military, environmental monitoring and forecasting, healthcare, intelligent home, intelligent transport vehicles, warehouse management, and precision agriculture. This assessment presents a brief introduction of RFID, WSN, and integration of WSN and RFID, and then applications related to both RFID and WSN. This assessment also deliberates status of the projects on RFID technology carried out in different computing group projects to be taken on WSN and RFID technology.

Keywords: wireless sensor network, RFID, embedded sensor, Wi-Fi, Bluetooth, integration, time saving, cost efficient

Procedia PDF Downloads 336
1808 The Role of Creative Entrepreneurship in the Development of Croatian Economy

Authors: Marko Kolakovic

Abstract:

Creative industries are an important sector of growth and development of knowledge economies. They have a positive impact on employment, economic growth, export and the quality of life in the areas where they are developed. Creative sectors include architecture, design, advertising, publishing, music, film, television and radio, video games, visual and performing arts and heritage. Following the positive trends of development of creative industries on the global and European level, this paper analyzes creative industries in general and specific characteristics of creative entrepreneurship. Special focus in this paper is put on the influence of the information communication technology on the development of new creative business models and protection of the intellectual property rights. One part of the paper is oriented on the analysis of the status of creative industries and creative entrepreneurship in Croatia. The main objective of the paper is by using the statistical analysis of creative industries in Croatia and information gained during the interviews with entrepreneurs, to make conclusions about potentials and development of creative industries in Croatia. Creative industries in Croatia are at the beginning of their development and growth strategy still does not exist at the national level. Statistical analysis pointed out that in 2015 creative enterprises made 9% of all enterprises in Croatia, employed 5,5% of employed people and their share in GDP was 4,01%. Croatian creative entrepreneurs are building competitive advantage using their creative resources and creating specific business models. The main obstacles they meet are lack of business experience and impossibility of focusing on the creative activities only. In their business, they use digital technologies and are focused on export. The conclusion is that creative industries in Croatia have development potential, but it is necessary to take adequate measures to use this potential in a right way.

Keywords: creative entrepreneurship, knowledge economy, business models, intellectual property

Procedia PDF Downloads 212
1807 Easily Memorable Strong Password Generation and Retrieval

Authors: Shatadru Das, Natarajan Vijayarangan

Abstract:

In this paper, a system and method for generating and recovering an authorization code has been designed and analyzed. The system creates an authorization code by accepting a base-sentence from a user. Based on the characters present in this base-sentence, the system computes a base-sentence matrix. The system also generates a plurality of patterns. The user can either select the pattern from the multiple patterns suggested by the system or can create his/her own pattern. The system then performs multiplications between the base-sentence matrix and the selected pattern matrix at different stages in the path forward, for obtaining a strong authorization code. In case the user forgets the base sentence, the system has a provision to manage and retrieve 'forgotten authorization code'. This is done by fragmenting the base sentence into different matrices and storing the fragmented matrices into a repository after computing matrix multiplication with a security question-answer approach and with a secret key provided by the user.

Keywords: easy authentication, key retrieval, memorable passwords, strong password generation

Procedia PDF Downloads 403
1806 Integration of Smart Grid Technologies with Smart Phones for Energy Monitoring and Management

Authors: Arjmand Khaliq, Pemra Sohaib

Abstract:

There is increasing trend of use of smart devices in the present age. The growth of computing techniques and advancement in hardware has also brought the use of sensors and smart devices to a high degree during the course of time. So use of smart devices for control, management communication and optimization has become very popular. This paper gives proposed methodology which involves sensing and switching unite for load, two way communications between utility company and smart phones of consumers using cellular techniques and price signaling resulting active participation of user in energy management .The goal of this proposed control methodology is active participation of user in energy management with accommodation of renewable energy resource. This will provide load adjustment according to consumer’s choice, increased security and reliability for consumer, switching of load according to consumer need and monitoring and management of energy.

Keywords: cellular networks, energy management, renewable energy source, smart grid technology

Procedia PDF Downloads 415
1805 Promoting Biofuels in India: Assessing Land Use Shifts Using Econometric Acreage Response Models

Authors: Y. Bhatt, N. Ghosh, N. Tiwari

Abstract:

Acreage response function are modeled taking account of expected harvest prices, weather related variables and other non-price variables allowing for partial adjustment possibility. At the outset, based on the literature on price expectation formation, we explored suitable formulations for estimating the farmer’s expected prices. Assuming that farmers form expectations rationally, the prices of food and biofuel crops are modeled using time-series methods for possible ARCH/GARCH effects to account for volatility. The prices projected on the basis of the models are then inserted to proxy for the expected prices in the acreage response functions. Food crop acreages in different growing states are found sensitive to their prices relative to those of one or more of the biofuel crops considered. The required percentage improvement in food crop yields is worked to offset the acreage loss.

Keywords: acreage response function, biofuel, food security, sustainable development

Procedia PDF Downloads 304
1804 Localization of Near Field Radio Controlled Unintended Emitting Sources

Authors: Nurbanu Guzey, S. Jagannathan

Abstract:

Locating radio controlled (RC) devices using their unintended emissions has a great interest considering security concerns. Weak nature of these emissions requires near field localization approach since it is hard to detect these signals in far field region of array. Instead of only angle estimation, near field localization also requires range estimation of the source which makes this method more complicated than far field models. Challenges of locating such devices in a near field region and real time environment are analyzed in this paper. An ESPRIT like near field localization scheme is utilized for both angle and range estimation. 1-D search with symmetric subarrays is provided. Two 7 element uniform linear antenna arrays (ULA) are employed for locating RC source. Experiment results of location estimation for one unintended emitting walkie-talkie for different positions are given.

Keywords: localization, angle of arrival (AoA), range estimation, array signal processing, ESPRIT, Uniform Linear Array (ULA)

Procedia PDF Downloads 529
1803 An Analysis of the Wheat Export Performance of Ukraine in Europe

Authors: Kiran Bala Das

Abstract:

This paper examines the Ukraine wheat export condition after Russian-Ukrainian military confrontation. The political conflict in Ukraine and the recent military intervention of Russia in Crimea is raising concern full effect of the events there is still uncertain, but some hints can be seen in the wheat market by analyzing the trend and pattern of Ukraine wheat export. Crimea is extremely important as it is where most of Ukraine grain exported by ship from its ports of the black sea. Ukraine is again seeking to establish itself a significant exporter of agricultural product with its rich black soil, it is chornozem the top soil layer that makes the country soil so fertile and become one of the major exporter of wheat in the world, its generous supplier of wheat make Ukraine 'Bread basket of Europe'. Ukraine possesses 30% of the world’s richest black soil; its agricultural industry has huge potential especially in grains. European Union (EU) is a significant trading partner of Ukraine but geopolitical tension adversely affects the wheat trade from black sea, which threatens Europe breadbasket. This study also highlights an index of export intensity to analyze the intensity of existing trade for the period 2011-2014 between Ukraine and EU countries. The result show export has intensified over the years, but this year low trade intensity. The overall consequence is hard to determine but if the situation deteriorates and Ukraine cutoff export, international wheat price will hike and grain prices (wheat) also come under the current circumstances and the recent development indicates how the grain market get affected and Agri future now in danger in Ukraine, and its forecast that Ukraine harvest low wheat crop this year and projected decline in export of wheat.

Keywords: breadbasket of Europe, export intensity index, growth rate, wheat export

Procedia PDF Downloads 350
1802 A Piebald Cladistic Portray of Mitochondrial DNA Control Region Haplogroups in Khyber Pakhtunkhwa, Pakistan

Authors: Shahzad Bhatti, M. Aslamkhan, Sana Abbas, Marcella Attimonelli, Hikmet Hakan Aydin, Erica Martinha Silva de Souza,

Abstract:

Despite being situated at the crossroad of Asia, Pakistan has gained crucial importance because of its pivotal role in subsequent migratory events. To highlight the genetic footprints and to contribute an enigmatic picture of the relative population expansion pattern among four major Pashtun tribes in Khyber Pakhtunkhwa viz., Bangash, Khattak, Mahsuds and Orakzai, the complete mitochondrial control region of 100 Pashtun were analyzed. All Pashtun tribes studied here revealed high genetic diversity; that was comparable to the other Central Asian, Southeast Asian and European populations. The configuration of genetic variation and heterogeneity further unveiled through Multidimensional Scaling, Principal Component Analysis, and phylogenetic analysis. The results revealed that the Pashtun is a composite mosaic of West Eurasian ancestry of numerous geographic origin. They received substantial gene flow during different invasions and have a high element of the Western provenance. The most common haplogroups reported in this study are: South Asian haplogroup M (28%) and R (8%); whereas, West Asians haplogroups are present, albeit in high frequencies (67%) and widespread over all; HV (15%), U (17%), H (9%), J (8%), K (8%), W (4%), N (3%) and T (3%). Herein we linked the unexplored genetic connection between Ashkenazi Jews and Pashtun. The presence of specific haplotypes J1b (4%) and K1a1b1a (5%) point to a genetic connection of Jewish conglomeration with Khattak tribe. This was a result of an ancient genetic influx in the early Neolithic period that led to the formation of a diverse genetic substratum in present day Pashtun.

Keywords: mtDNA haplogroups, control region, Pakistan, KPK, ethnicity

Procedia PDF Downloads 484
1801 Facial Biometric Privacy Using Visual Cryptography: A Fundamental Approach to Enhance the Security of Facial Biometric Data

Authors: Devika Tanna

Abstract:

'Biometrics' means 'life measurement' but the term is usually associated with the use of unique physiological characteristics to identify an individual. It is important to secure the privacy of digital face image that is stored in central database. To impart privacy to such biometric face images, first, the digital face image is split into two host face images such that, each of it gives no idea of existence of the original face image and, then each cover image is stored in two different databases geographically apart. When both the cover images are simultaneously available then only we can access that original image. This can be achieved by using the XM2VTS and IMM face database, an adaptive algorithm for spatial greyscale. The algorithm helps to select the appropriate host images which are most likely to be compatible with the secret image stored in the central database based on its geometry and appearance. The encryption is done using GEVCS which results in a reconstructed image identical to the original private image.

Keywords: adaptive algorithm, database, host images, privacy, visual cryptography

Procedia PDF Downloads 133
1800 Effect of Citrulline on the Physical Performance of a Soccer-Specific Exercises in Adult Professional Soccer Players

Authors: Bezuglov Eduard, Ryland Morgans, Talibov Oleg, Kalinin Evgeny, Butovsky Mikhail, Savin Evgeny, Tzgoev Eduard, Artemii Lazarev, Bekzhan Pirmakhanov, Anthony C. Hackney

Abstract:

Currently, there is conflicting evidence regarding the efficacy of citrulline for physical performance and post-exercise recovery. Moreover, the vast majority of studies conducted used physically active volunteers from the general population and heterogeneous exercise protocols that are not specific to most sports. A single use of citrulline, regardless of the dose, will not have a significant effect on physical performance and post-exercise recovery in highly trained soccer players performing sport-specific exercises at maximum intensity. To evaluate the effectiveness of a single administration of citrulline at various doses in adult male professional soccer players performing sport-specific exercise at maximum intensity. A randomized, double-blind, placebo-controlled study analyzing eighteen soccer players from the top divisions of several European countries. The participants were randomized into three groups of six and performed a field-based soccer-specific test at 115% VO2max for 18-minutes. Comparative analysis of the cardiovascular system, physical activity, subjective perceived fatigue and post-exercise recovery was conducted. There were no statistically significant differences in more than one analyzed parameter. A single application of 3 to 6 grams of citrulline does not affect physical performance, subjective feeling of fatigue and post-exercise recovery in adult professional soccer players who have performed a sport-specific test. Currently, citrulline cannot be recommended for use as a supplement in adult professional soccer players

Keywords: citrulline, performance, recovery, soccer players

Procedia PDF Downloads 103
1799 Enhancing Financial Security: Real-Time Anomaly Detection in Financial Transactions Using Machine Learning

Authors: Ali Kazemi

Abstract:

The digital evolution of financial services, while offering unprecedented convenience and accessibility, has also escalated the vulnerabilities to fraudulent activities. In this study, we introduce a distinct approach to real-time anomaly detection in financial transactions, aiming to fortify the defenses of banking and financial institutions against such threats. Utilizing unsupervised machine learning algorithms, specifically autoencoders and isolation forests, our research focuses on identifying irregular patterns indicative of fraud within transactional data, thus enabling immediate action to prevent financial loss. The data we used in this study included the monetary value of each transaction. This is a crucial feature as fraudulent transactions may have distributions of different amounts than legitimate ones, such as timestamps indicating when transactions occurred. Analyzing transactions' temporal patterns can reveal anomalies (e.g., unusual activity in the middle of the night). Also, the sector or category of the merchant where the transaction occurred, such as retail, groceries, online services, etc. Specific categories may be more prone to fraud. Moreover, the type of payment used (e.g., credit, debit, online payment systems). Different payment methods have varying risk levels associated with fraud. This dataset, anonymized to ensure privacy, reflects a wide array of transactions typical of a global banking institution, ranging from small-scale retail purchases to large wire transfers, embodying the diverse nature of potentially fraudulent activities. By engineering features that capture the essence of transactions, including normalized amounts and encoded categorical variables, we tailor our data to enhance model sensitivity to anomalies. The autoencoder model leverages its reconstruction error mechanism to flag transactions that deviate significantly from the learned normal pattern, while the isolation forest identifies anomalies based on their susceptibility to isolation from the dataset's majority. Our experimental results, validated through techniques such as k-fold cross-validation, are evaluated using precision, recall, and the F1 score alongside the area under the receiver operating characteristic (ROC) curve. Our models achieved an F1 score of 0.85 and a ROC AUC of 0.93, indicating high accuracy in detecting fraudulent transactions without excessive false positives. This study contributes to the academic discourse on financial fraud detection and provides a practical framework for banking institutions seeking to implement real-time anomaly detection systems. By demonstrating the effectiveness of unsupervised learning techniques in a real-world context, our research offers a pathway to significantly reduce the incidence of financial fraud, thereby enhancing the security and trustworthiness of digital financial services.

Keywords: anomaly detection, financial fraud, machine learning, autoencoders, isolation forest, transactional data analysis

Procedia PDF Downloads 62
1798 Westernization of Islamic Culture, A Historical Analysis

Authors: Saidalavi Kannattippadi

Abstract:

It is a culture based study on revealing how the indebtedness of the west belongs to the moral and scientific culture of Islam, even to such a way to be said there was no room for renaissance and the enlightment of the west without the active intervention of the Islamic culture in thoughts and activities of the European thinkers. The study focuses on the exact causes that led the west to the renaissance and goes through analyzing each of historical evidences for confirming the continuous cultural assimilations that occurred between east and west, through transmissions of knowledge, translations of unique treatises, study trips and so on. The west had deeply influenced by the thought and culture of Islam after having a long bitter experience from the blind rituals and customs introduced by the church and was expecting for a movement that can raise them upwards from the bankruptcy of morality and spirituality. The sequence of crusades and voyages of thinkers from west to eastern wards made the western people aware of the best culture ever found in the world as in name of Islam and they become ready to assimilate its notable cultural values and to borrow its cultural achievements. The west had two types of influences from the Islam; moral and scientific. the uprooting of untouchablitlity and racism from western society and their accepting the ideologies of equality and fraternity are moral influence and the innumerable inventions and discoveries found in modern science and technology are the scientific influences. Without the frantic efforts of Muslims in translating, modifying and commenting the science and philosophy of the Greek the west would not have even a chance to peep to the cultural values of the Greek. Here the Muslims are the guides and channels through which the west got educated and well cultured. The study also briefly sheds light on the cultural achievements of Muslims in material science, human science, etc.

Keywords: cultural assimilation, culture and civilization, indebtedness, Muslim world, west, translation, transmission

Procedia PDF Downloads 399