Search results for: cloud privacy and security
895 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6
Authors: M. Moslehpour, S. Khorsandi
Abstract:
Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing
Procedia PDF Downloads 278894 The Effect of Artificial Intelligence on Human Rights Regulations
Authors: Karam Aziz Hamdy Fahmy
Abstract:
Although human rights protection in the industrial sector has increased, human rights violations continue to occur. Although the government has passed human rights laws, labor laws, and an international treaty ratified by the United States, human rights crimes continue to occur and go undetected. The growing number of textile companies in Bekasi is also leading to an increase in human rights violations as the government has no obligation to protect them. The United States government and business leaders should respect, protect and defend the human rights of workers. The article discusses the human rights violations faced by garment factory workers in the context of the law, as well as ideas for improving the protection of workers' rights. The connection between development and human rights has long been the subject of academic debate. Therefore, to understand the dynamics between these two concepts, a number of principles have been adopted, ranging from the right to development to a human rights-based approach to development. Despite these attempts, the precise connection between development and human rights is not yet fully understood. However, the inherent interdependence between these two concepts and the idea that development efforts must respect human rights guarantees has gained momentum in recent years. It will then be examined whether the right to sustainable development is recognized.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security
Procedia PDF Downloads 65893 Social Media Governance in UK Higher Education Institutions
Authors: Rebecca Lees, Deborah Anderson
Abstract:
Whilst the majority of research into social media in education focuses on the applications for teaching and learning environments, this study looks at how such activities can be managed by investigating the current state of social media regulation within UK higher education. Social media has pervaded almost all aspects of higher education; from marketing, recruitment and alumni relations to both distance and classroom-based learning and teaching activities. In terms of who uses it and how it is used, social media is growing at an unprecedented rate, particularly amongst the target market for higher education. Whilst the platform presents opportunities not found in more traditional methods of communication and interaction, such as speed and reach, it also carries substantial risks that come with inappropriate use, lack of control and issues of privacy. Typically, organisations rely on the concept of a social contract to guide employee behaviour to conform to the expectations of that organisation. Yet, where academia and social media intersect applying the notion of a social contract to enforce governance may be problematic; firstly considering the emphasis on treating students as customers with a growing focus on the use and collection of satisfaction metrics; and secondly regarding the notion of academic’s freedom of speech, opinion and discussion, which is a long-held tradition of learning instruction. Therefore the need for sound governance procedures to support expectations over online behaviour is vital, especially when the speed and breadth of adoption of social media activities has in the past outrun organisations’ abilities to manage it. An analysis of the current level of governance was conducted by gathering relevant policies, guidelines and best practice documentation available online via internet search and institutional requests. The documents were then subjected to a content analysis in the second phase of this study to determine the approach taken by institutions to apply such governance. Documentation was separated according to audience, i.e.: applicable to staff, students or all users. Given many of these included guests and visitors to the institution within their scope being easily accessible was considered important. Yet, within the UK only about half of all education institutions had explicit social media governance documentation available online without requiring member access or considerable searching. Where they existed, the majority focused solely on employee activities and tended to be policy based rather than rooted in guidelines or best practices, or held a fallback position of governing online behaviour via implicit instructions within IT and computer regulations. Explicit instructions over expected online behaviours is therefore lacking within UK HE. Given the number of educational practices that now include significant online components, it is imperative that education organisations keep up to date with the progress of social media use. Initial results from the second phase of this study which analyses the content of the governance documentation suggests they require reading levels at or above the target audience, with some considerable variability in length and layout. Further analysis will add to this growing field of investigating social media governance within higher education.Keywords: governance, higher education, policy, social media
Procedia PDF Downloads 184892 Breakfast Eating Pattern Associated with Nutritional Status of Urban Primary Schoolchildren in Iran and India
Authors: Sahar Hooshmand, Mohammad Reza Bagherzadeh Anasari
Abstract:
The aim of this study was to examine the effect of breakfast eating pattern (between frequencies of breakfast consumers and non-consumers) on nutritional status (weight for age, height for age and weight for height). A total 4570 primary school children aged 6-9 years old constituted the sample. From these, 2234 Iranian school children (1218 girls and 1016 boys) and 2336 Indian school children (1096 girls and 1240 boys) were included in a cross sectional study. Breakfast frequency consumption was recorded through an interview with mothers of children. Height and wight of children were taken and body mass index were calculated. The World Health Organization’s (WHO) AnthroPlus software used to assess the nutritional status of the children. Weight for age z-scores were slightly associated with frequency of consuming breakfast in both India (χ2 = 60.083, p=0.000) and Iran (χ2 = 18.267, p=0.032). A significant association was seen between frequency of child‘s breakfast intake and the height z-scores in both India (χ2 = 31.334, p=0.000) and Iran (χ2 = 19.443, p=0.022). Most of children with normal height had breakfast daily in both countries. A significant association was seen with children‘s BMI z-scores of Indian children (χ2 = 31.247, p=0.000) but it was not significant in Iran (χ2 = 10.791, p=0.095). The present study confirms the observations of other studies that showed more frequency in having breakfast is associated with better nutritional status.Keywords: breakfast, schoolchildren, nutritional status, global food security
Procedia PDF Downloads 516891 Determination of Measurement Uncertainty of the Diagnostic Meteorological Model CALMET
Authors: Nina Miklavčič, Urška Kugovnik, Natalia Galkina, Primož Ribarič, Rudi Vončina
Abstract:
Today, the need for weather predictions is deeply rooted in the everyday life of people as well as it is in industry. The forecasts influence final decision-making processes in multiple areas, from agriculture and prevention of natural disasters to air traffic regulations and solutions on a national level for health, security, and economic problems. Namely, in Slovenia, alongside other existing forms of application, weather forecasts are adopted for the prognosis of electrical current transmission through powerlines. Meteorological parameters are one of the key factors which need to be considered in estimations of the reliable supply of electrical energy to consumers. And like for any other measured value, the knowledge about measurement uncertainty is also critical for the secure and reliable supply of energy. The estimation of measurement uncertainty grants us a more accurate interpretation of data, a better quality of the end results, and even a possibility of improvement of weather forecast models. In the article, we focused on the estimation of measurement uncertainty of the diagnostic microscale meteorological model CALMET. For the purposes of our research, we used a network of meteorological stations spread in the area of our interest, which enables a side-by-side comparison of measured meteorological values with the values calculated with the help of CALMET and the measurement uncertainty estimation as a final result.Keywords: uncertancy, meteorological model, meteorological measurment, CALMET
Procedia PDF Downloads 81890 Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology
Authors: Mark Davey
Abstract:
Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases.Keywords: embedded systems, multiprocessor, network on chip, side channel
Procedia PDF Downloads 71889 The Effects of Different Parameters of Wood Floating Debris on Scour Rate Around Bridge Piers
Authors: Muhanad Al-Jubouri
Abstract:
A local scour is the most important of the several scours impacting bridge performance and security. Even though scour is widespread in bridges, especially during flood seasons, the experimental tests could not be applied to many standard highway bridges. A computational fluid dynamics numerical model was used to solve the problem of calculating local scouring and deposition for non-cohesive silt and clear water conditions near single and double cylindrical piers with the effect of floating debris. When FLOW-3D software is employed with the Rang turbulence model, the Nilsson bed-load transfer equation and fine mesh size are considered. The numerical findings of single cylindrical piers correspond pretty well with the physical model's results. Furthermore, after parameter effectiveness investigates the range of outcomes based on predicted user inputs such as the bed-load equation, mesh cell size, and turbulence model, the final numerical predictions are compared to experimental data. When the findings are compared, the error rate for the deepest point of the scour is equivalent to 3.8% for the single pier example.Keywords: local scouring, non-cohesive, clear water, computational fluid dynamics, turbulence model, bed-load equation, debris
Procedia PDF Downloads 69888 The Place of Herbal Teas Based on Medicinal Plants in the Treatment and Comfort of Infants
Authors: Metahri Leyla, Helali Amal, Dali Yahia Mustapha Kamel
Abstract:
Herbal medicine is one of the oldest medicines in the world. It constitutes an interesting alternative to treat and cure without creating new diseases. Despite the progress of medicine, the increase in the number of doctors, the creation of social security, many parents have resorted to herbal medicine for their children; they are increasingly asking for "natural remedies", "without risk" for their children. Herbal tea is a very accessible way to enjoy the benefits of herbal medicine. Accordingly; the objective of our study is to obtain detailed information on the composition and mode of administration of these herbal teas and to identify the different plants used; their beneficial effects, as well as their possible toxicity. The current research work represents an ethnobotanical survey spread over one month (from January 6, 2021 to February 19, 2021) carried out by means of an electronic questionnaire concerning 753 respondents, involving single or multiparous mothers. The obtained results reveal that a total of 684 mothers used herbal teas for their infants, which revealed the use of 55 herbal remedies for several indications, the most sought after are the carminative effect and relief of colic, and which 9% of users noticed undesirable effects linked to the administration of herbal teas to their infants. As a conclusion, it has been asserted that the use of herbal teas as a natural remedy by Algerian mothers is a widely accepted practice, however the "natural" nature of the plants does not mean that they are harmless.Keywords: Keywords: Herbal medicine, Herbal teas, Children, Mothers, Medicinal plants.
Procedia PDF Downloads 98887 Nutritional Quality Assessment and Safety Evaluation of Food Crops
Authors: Olawole Emmanuel Aina, Liziwe Lizbeth Mugivhisa, Joshua Oluwole Olowoyo, Chikwela Lawrence Obi
Abstract:
In sustained and consistent efforts to improve food security, numerous and different methods are proposed and used in the production of food crops, and farm produce to meet the demands of consumers. However, unregulated and indiscriminate methods of production present another problem that may expose consumers of these food crops to potential health risks. Therefore, it is imperative that a thorough assessment of farm produce is carried out due to the growing trend of health-conscious consumers preference for minimally processed or raw farm produce. This study evaluated the safety and nutritional quality of food crops. The objectives were to compare the nutritional quality of organic and inorganic farm produce in one hand and, on the other, evaluate the safety of farm produce with respect to trace metal and pathogenic contamination. We conducted a broad systematic search of peer-reviewed published literatures from databases and search engines such as science direct, web-of-science, Google scholar, and Scopus. This study concluded that there is no conclusive evidence to support the notion of nutritional superiority of organic food crops over their inorganic counterparts and there are documented reports of pathogenic and metal contaminations of food crops.Keywords: food crops, fruits and vegetables, pathogens, nutrition, trace metals
Procedia PDF Downloads 80886 Transforming Public Administration in the Digital Era: Challenges and Opportunities
Authors: Catalina Oana Dumitrescu, Andreea L. Drugau-constantin
Abstract:
In the digital age, public administration is facing profound change, fueled by technological advances and the growing demands of citizens for efficient, accessible and transparent services. This paper explores how new digital technologies – including artificial intelligence, blockchain, big data and e-governance solutions – are reshaping the functioning of public administrations globally. In addition to the obvious opportunities to streamline and optimize processes, digital transformation brings with it major challenges, such as cyber security, personal data protection, resistance to change and the need to develop new skills for employees. The paper aims to provide a discussion platform for public administration experts, policy makers and technology innovators to consider how governments can balance the benefits and risks of digital transformation. Topics such as the reconfiguration of administrative processes, the creation of interoperable government systems, the involvement of citizens in public decisions through digital platforms, and solutions for reducing the digital gap between developed and developing regions will be addressed. In conclusion, the digital transformation of public administration is not only an opportunity for modernization, but also a necessity to respond to the new demands and challenges of contemporary society. This paper will provide new insights into the role of technology in improving the quality of governance and public services.Keywords: public administration, digital ERA, technology, government systems, global
Procedia PDF Downloads 17885 Industrial Investment and Contract Models in Subway Projects: Case Study
Authors: Seyed Habib A. Rahmati, Parsa Fallah Sheikhlari, Morteza Musakhani
Abstract:
This paper studies the structure of financial investment and efficiency on the subway would be created between Hashtgerd and Qazvin in Iran. Regarding ascending rate of transportation between Tehran and Qazvin which directly air pollution, it clearly implies to public transportation requirement between these two cities near Tehran. The railway transportation like subway can help each country to terminate traffic jam which has some advantages such as speed, security, non-pollution, low cost of public transport, etc. This type of transportation needs national infrastructures which require enormous investment. It couldn’t implement without leading and managing funds and investments properly. In order to response 'needs', clear norms or normative targets have to be agreed and obviously it is important to distinguish costs from investment requirements critically. Implementation phase affects investment requirements and financing needs. So recognizing barrier related to investment and the quality of investment (what technologies and services are invested in) is as important as the amounts of investment. Different investment methods have mentioned as follows loan, leasing, equity participation, Line of financing, finance, usance, bay back. Alternatives survey before initiation and analyzing of risk management is one of the most important parts in this project. Observation of similar project cities each country has the own specification to choose investment method.Keywords: subway project, project investment, project contract, project management
Procedia PDF Downloads 480884 Strengthening Civil Society Organizations (CSOs) in ASEAN Community: The Case of Nahdlatul Ulama
Authors: Andi Triswoyo
Abstract:
The establishment of ASEAN Community 2015 was proposed to integrate concretely, in terms of regional cooperation. All of the members of the ASEAN itself compete to prepare themselves in the actual place. Regarding to the Bali Concord III, subsequently ASEAN Community was categorized by three elements, such as (1) ASEAN Political-security Community (APC), (2) ASEAN Economic Community (AEC), and (3) ASEAN Socio-cultural Community (ASC). Preparing on three components above, civil society organizations must be prioritized as the main body, which ensure grassroots society itself obtain maximum benefits or advantage of these declarations. NU, as the representative of mass-based organizations, was choose, due to the highly influences toward Moslem rural-traditionalist, which has the largest followers in Indonesia. This paper was aimed to explain the contribution of NU in developing and empowering society. Furthermore, it will use historical perspective, by looking for related data, which contain basic- knowledge and explanatory facts in literary desk. It would elaborate in NU’s urgency for promoting civil societies roles in ASEAN Community. In the ends, this paper was proposed to measure to what extend NU’s roles in promoting the Civil Society in Indonesia and its potential capability to get involved at the upcoming regional communities. Hopefully, the attempt to strengthen Civil Society Organizations (CSOs), like NU can push faster in creating good governance and democracy, toward social configurations amongst state, market and civil society.Keywords: ASEAN community, Nahdlatul Ulama, civil society organizations(CSO), civil society
Procedia PDF Downloads 280883 Farmers Perception on the Level of Participation in Agricultural Project: The Case of a Community Garden Project in Imphendhle Municipality of Kwazulu-Natal Province, South Africa
Authors: Jorine T. Ndoro, Marietjie Van Der Merwe
Abstract:
Rural poverty remains a critical challenge in most developing countries and the participation of farmers in agricultural projects has taken a key role in development initiatives. Farmers’ participation in agricultural initiatives is crucial towards poverty alleviation and food security. Farmers’ involvement directly contributes towards sustainable agricultural development and livelihoods. This study focuses on investigating the perceptions of farmers’ participation in a community garden project. The study involved farmers belonging to community garden project in Imphendhle municipality in Mgungundlvu district of KwaZulu-Natal in South Africa. The study followed a qualitative research design using an interpretive research paradigm. The data was collected through conducting in-depth semi-structured interviews and a focus group was conducted with the eight farmers belonging to the community garden project. The findings show that the farmers are not involved in decision makings in the project. The farmers are passive participants. Participation of the farmers was mainly to carry out the activities from the extension officers. The study recommends that farmers be actively involved in projects and programmes introduced in their communities. Farmers’ active participation contributes to the sustainability of the projects through a sense of ownership.Keywords: farmers, participation, agricultural extension, community garden
Procedia PDF Downloads 256882 Artificial Neural Network and Satellite Derived Chlorophyll Indices for Estimation of Wheat Chlorophyll Content under Rainfed Condition
Authors: Muhammad Naveed Tahir, Wang Yingkuan, Huang Wenjiang, Raheel Osman
Abstract:
Numerous models used in prediction and decision-making process but most of them are linear in natural environment, and linear models reach their limitations with non-linearity in data. Therefore accurate estimation is difficult. Artificial Neural Networks (ANN) found extensive acceptance to address the modeling of the complex real world for the non-linear environment. ANN’s have more general and flexible functional forms than traditional statistical methods can effectively deal with. The link between information technology and agriculture will become more firm in the near future. Monitoring crop biophysical properties non-destructively can provide a rapid and accurate understanding of its response to various environmental influences. Crop chlorophyll content is an important indicator of crop health and therefore the estimation of crop yield. In recent years, remote sensing has been accepted as a robust tool for site-specific management by detecting crop parameters at both local and large scales. The present research combined the ANN model with satellite-derived chlorophyll indices from LANDSAT 8 imagery for predicting real-time wheat chlorophyll estimation. The cloud-free scenes of LANDSAT 8 were acquired (Feb-March 2016-17) at the same time when ground-truthing campaign was performed for chlorophyll estimation by using SPAD-502. Different vegetation indices were derived from LANDSAT 8 imagery using ERADAS Imagine (v.2014) software for chlorophyll determination. The vegetation indices were including Normalized Difference Vegetation Index (NDVI), Green Normalized Difference Vegetation Index (GNDVI), Chlorophyll Absorbed Ratio Index (CARI), Modified Chlorophyll Absorbed Ratio Index (MCARI) and Transformed Chlorophyll Absorbed Ratio index (TCARI). For ANN modeling, MATLAB and SPSS (ANN) tools were used. Multilayer Perceptron (MLP) in MATLAB provided very satisfactory results. For training purpose of MLP 61.7% of the data, for validation purpose 28.3% of data and rest 10% of data were used to evaluate and validate the ANN model results. For error evaluation, sum of squares error and relative error were used. ANN model summery showed that sum of squares error of 10.786, the average overall relative error was .099. The MCARI and NDVI were revealed to be more sensitive indices for assessing wheat chlorophyll content with the highest coefficient of determination R²=0.93 and 0.90 respectively. The results suggested that use of high spatial resolution satellite imagery for the retrieval of crop chlorophyll content by using ANN model provides accurate, reliable assessment of crop health status at a larger scale which can help in managing crop nutrition requirement in real time.Keywords: ANN, chlorophyll content, chlorophyll indices, satellite images, wheat
Procedia PDF Downloads 146881 Change of Education Business in the Age of 5G
Authors: Heikki Ruohomaa, Vesa Salminen
Abstract:
Regions are facing huge competition to attract companies, businesses, inhabitants, students, etc. This way to improve living and business environment, which is rapidly changing due to digitalization. On the other hand, from the industry's point of view, the availability of a skilled labor force and an innovative environment are crucial factors. In this context, qualified staff has been seen to utilize the opportunities of digitalization and respond to the needs of future skills. World Manufacturing Forum has stated in the year 2019- report that in next five years, 40% of workers have to change their core competencies. Through digital transformation, new technologies like cloud, mobile, big data, 5G- infrastructure, platform- technology, data- analysis, and social networks with increasing intelligence and automation, enterprises can capitalize on new opportunities and optimize existing operations to achieve significant business improvement. Digitalization will be an important part of the everyday life of citizens and present in the working day of the average citizen and employee in the future. For that reason, the education system and education programs on all levels of education from diaper age to doctorate have been directed to fulfill this ecosystem strategy. Goal: The Fourth Industrial Revolution will bring unprecedented change to societies, education organizations and business environments. This article aims to identify how education, education content, the way education has proceeded, and overall whole the education business is changing. Most important is how we should respond to this inevitable co- evolution. Methodology: The study aims to verify how the learning process is boosted by new digital content, new learning software and tools, and customer-oriented learning environments. The change of education programs and individual education modules can be supported by applied research projects. You can use them in making proof- of- the concept of new technology, new ways to teach and train, and through the experiences gathered change education content, way to educate and finally education business as a whole. Major findings: Applied research projects can prove the concept- phases on real environment field labs to test technology opportunities and new tools for training purposes. Customer-oriented applied research projects are also excellent for students to make assignments and use new knowledge and content and teachers to test new tools and create new ways to educate. New content and problem-based learning are used in future education modules. This article introduces some case study experiences on customer-oriented digital transformation projects and how gathered knowledge on new digital content and a new way to educate has influenced education. The case study is related to experiences of research projects, customer-oriented field labs/learning environments and education programs of Häme University of Applied Sciences.Keywords: education process, digitalization content, digital tools for education, learning environments, transdisciplinary co-operation
Procedia PDF Downloads 176880 Magnetic Treatment of Irrigation Water and Its Effect on Water Salinity
Authors: Muhammad Waqar Ashraf
Abstract:
The influence of magnetic field on the structure of water and aqueous solutions are similar and can alter the physical and chemical properties of water-dispersed systems. With the application of magnetic field, hydration of salt ions and other impurities slides down and improve the possible technological characteristics of the water. Magnetic field can enhance the characteristic of water i.e. better salt solubility, kinetic changes in salt crystallization, accelerated coagulation, etc. Gulf countries are facing critical problem due to depletion of water resources and increasing food demands to cover the human needs; therefore water shortage is being increasingly accepted as a major limitation for increased agricultural production and food security. In arid and semi-arid regions sustainable agricultural development is influenced to a great extent by water quality that might be used economically and effectively in developing agriculture programs. In the present study, the possibility of using magnetized water to desalinate the soil is accounted for the enhanced dissolving capacity of the magnetized water. Magnetic field has been applied to treat brackish water. The study showed that the impact of magnetic field on saline water is sustained up to three hours (with and without shaking). These results suggest that even low magnetic field can decrease the electrical conductivity and total dissolved solids which are good for the removal of salinity from the irrigated land by using magnetized water.Keywords: magnetic treatment, saline water, hardness of water, removal of salinity
Procedia PDF Downloads 498879 Intrusion Detection in Computer Networks Using a Hybrid Model of Firefly and Differential Evolution Algorithms
Authors: Mohammad Besharatloo
Abstract:
Intrusion detection is an important research topic in network security because of increasing growth in the use of computer network services. Intrusion detection is done with the aim of detecting the unauthorized use or abuse in the networks and systems by the intruders. Therefore, the intrusion detection system is an efficient tool to control the user's access through some predefined regulations. Since, the data used in intrusion detection system has high dimension, a proper representation is required to show the basis structure of this data. Therefore, it is necessary to eliminate the redundant features to create the best representation subset. In the proposed method, a hybrid model of differential evolution and firefly algorithms was employed to choose the best subset of properties. In addition, decision tree and support vector machine (SVM) are adopted to determine the quality of the selected properties. In the first, the sorted population is divided into two sub-populations. These optimization algorithms were implemented on these sub-populations, respectively. Then, these sub-populations are merged to create next repetition population. The performance evaluation of the proposed method is done based on KDD Cup99. The simulation results show that the proposed method has better performance than the other methods in this context.Keywords: intrusion detection system, differential evolution, firefly algorithm, support vector machine, decision tree
Procedia PDF Downloads 91878 Detecting Venomous Files in IDS Using an Approach Based on Data Mining Algorithm
Authors: Sukhleen Kaur
Abstract:
In security groundwork, Intrusion Detection System (IDS) has become an important component. The IDS has received increasing attention in recent years. IDS is one of the effective way to detect different kinds of attacks and malicious codes in a network and help us to secure the network. Data mining techniques can be implemented to IDS, which analyses the large amount of data and gives better results. Data mining can contribute to improving intrusion detection by adding a level of focus to anomaly detection. So far the study has been carried out on finding the attacks but this paper detects the malicious files. Some intruders do not attack directly, but they hide some harmful code inside the files or may corrupt those file and attack the system. These files are detected according to some defined parameters which will form two lists of files as normal files and harmful files. After that data mining will be performed. In this paper a hybrid classifier has been used via Naive Bayes and Ripper classification methods. The results show how the uploaded file in the database will be tested against the parameters and then it is characterised as either normal or harmful file and after that the mining is performed. Moreover, when a user tries to mine on harmful file it will generate an exception that mining cannot be made on corrupted or harmful files.Keywords: data mining, association, classification, clustering, decision tree, intrusion detection system, misuse detection, anomaly detection, naive Bayes, ripper
Procedia PDF Downloads 414877 Innocent Victims and Immoral Women: Sex Workers in the Philippines through the Lens of Mainstream Media
Authors: Sharmila Parmanand
Abstract:
This paper examines dominant media representations of prostitution in the Philippines and interrogates sex workers’ interactions with the media establishment. This analysis of how sex workers are constituted in media, often as both innocent victims and immoral actors, contributes to an understanding of public discourse on sex work in the Philippines, where decriminalisation has recently been proposed and sex workers are currently classified as potential victims under anti-trafficking laws but also as criminals under the penal code. The first part is an analysis of media coverage of two prominent themes on prostitution: first, raid and rescue operations conducted by law enforcement; and second, prostitution on military bases and tourism hotspots. As a result of pressure from activists and international donors, these two themes often define the policy conversations on sex work in the Philippines. The discourses in written and televised news reports and documentaries from established local and international media sources that address these themes are explored through content analysis. Conclusions are drawn based on specific terms commonly used to refer to sex workers, how sex workers are seen as performing their cultural roles as mothers and wives, how sex work is depicted, associations made between sex work and public health, representations of clients and managers and ‘rescuers’ such as the police, anti-trafficking organisations, and faith-based groups, and which actors are presumed to be issue experts. Images of how prostitution is used as a metaphor for relations between the Philippines and foreign nations are also deconstructed, along with common tropes about developing world female subjects. In general, sex workers are simultaneously portrayed as bad mothers who endanger their family’s morality but also as long-suffering victims who endure exploitation for the sake of their children. They are also depicted as unclean, drug-addicted threats to public health. Their managers and clients are portrayed as cold, abusive, and sometimes violent, and their rescuers as moral and altruistic agents who are essential for sex workers’ rehabilitation and restoration as virtuous citizens. The second part explores sex workers’ own perceptions of their interactions with media, through interviews with members of the Philippine Sex Workers Collective, a loose organisation of sex workers around the Philippines. They reveal that they are often excluded by media practitioners and that they do not feel that they have space for meaningful self-revelation about their work when they do engage with journalists, who seem to have an overt agenda of depicting them as either victims or women of loose morals. In their assessment, media narratives do not necessarily reflect their lived experiences, and in some cases, coverage of rescues and raid operations endangers their privacy and instrumentalises their suffering. Media representations of sex workers may produce subject positions such as ‘victims’ or ‘criminals’ and legitimize specific interventions while foreclosing other ways of thinking. Further, in light of media’s power to reflect and shape public consciousness, it is a valuable academic and political project to examine whether sex workers are able to assert agency in determining how they are represented.Keywords: discourse analysis, news media, sex work, trafficking
Procedia PDF Downloads 393876 Application of the Mobile Phone for Occupational Self-Inspection Program in Small-Scale Industries
Authors: Jia-Sin Li, Ying-Fang Wang, Cheing-Tong Yan
Abstract:
In this study, an integrated approach of Google Spreadsheet and QR code which is free internet resources was used to improve the inspection procedure. The mobile phone Application(App)was also designed to combine with a web page to create an automatic checklist in order to provide a new integrated information of inspection management system. By means of client-server model, the client App is developed for Android mobile OS and the back end is a web server. It can set up App accounts including authorized data and store some checklist documents in the website. The checklist document URL could generate QR code first and then print and paste on the machine. The user can scan the QR code by the app and filled the checklist in the factory. In the meanwhile, the checklist data will send to the server, it not only save the filled data but also executes the related functions and charts. On the other hand, it also enables auditors and supervisors to facilitate the prevention and response to hazards, as well as immediate report data checks. Finally, statistics and professional analysis are performed using inspection records and other relevant data to not only improve the reliability, integrity of inspection operations and equipment loss control, but also increase plant safety and personnel performance. Therefore, it suggested that the traditional paper-based inspection method could be replaced by the APP which promotes the promotion of industrial security and reduces human error.Keywords: checklist, Google spreadsheet, APP, self-inspection
Procedia PDF Downloads 118875 A Method for Identifying Unusual Transactions in E-commerce Through Extended Data Flow Conformance Checking
Authors: Handie Pramana Putra, Ani Dijah Rahajoe
Abstract:
The proliferation of smart devices and advancements in mobile communication technologies have permeated various facets of life with the widespread influence of e-commerce. Detecting abnormal transactions holds paramount significance in this realm due to the potential for substantial financial losses. Moreover, the fusion of data flow and control flow assumes a critical role in the exploration of process modeling and data analysis, contributing significantly to the accuracy and security of business processes. This paper introduces an alternative approach to identify abnormal transactions through a model that integrates both data and control flows. Referred to as the Extended Data Petri net (DPNE), our model encapsulates the entire process, encompassing user login to the e-commerce platform and concluding with the payment stage, including the mobile transaction process. We scrutinize the model's structure, formulate an algorithm for detecting anomalies in pertinent data, and elucidate the rationale and efficacy of the comprehensive system model. A case study validates the responsive performance of each system component, demonstrating the system's adeptness in evaluating every activity within mobile transactions. Ultimately, the results of anomaly detection are derived through a thorough and comprehensive analysis.Keywords: database, data analysis, DPNE, extended data flow, e-commerce
Procedia PDF Downloads 56874 Medical Image Watermark and Tamper Detection Using Constant Correlation Spread Spectrum Watermarking
Authors: Peter U. Eze, P. Udaya, Robin J. Evans
Abstract:
Data hiding can be achieved by Steganography or invisible digital watermarking. For digital watermarking, both accurate retrieval of the embedded watermark and the integrity of the cover image are important. Medical image security in Teleradiology is one of the applications where the embedded patient record needs to be extracted with accuracy as well as the medical image integrity verified. In this research paper, the Constant Correlation Spread Spectrum digital watermarking for medical image tamper detection and accurate embedded watermark retrieval is introduced. In the proposed method, a watermark bit from a patient record is spread in a medical image sub-block such that the correlation of all watermarked sub-blocks with a spreading code, W, would have a constant value, p. The constant correlation p, spreading code, W and the size of the sub-blocks constitute the secret key. Tamper detection is achieved by flagging any sub-block whose correlation value deviates by more than a small value, ℇ, from p. The major features of our new scheme include: (1) Improving watermark detection accuracy for high-pixel depth medical images by reducing the Bit Error Rate (BER) to Zero and (2) block-level tamper detection in a single computational process with simultaneous watermark detection, thereby increasing utility with the same computational cost.Keywords: Constant Correlation, Medical Image, Spread Spectrum, Tamper Detection, Watermarking
Procedia PDF Downloads 194873 Group Boundaries against and Due to Identity Threat
Authors: Anna Siegler, Sara Bigazzi, Sara Serdult, Ildiko Bokretas
Abstract:
Social identity emerging from group membership defines the representational processes of our social reality. Based on our theoretical assumption the subjective perception of identity threat leads to an instable identity structure. The need to re-establish the positive identity will lead us to strengthen group boundaries. Prejudice in our perspective offer psychological security those who thinking in exclusive barriers, and we suggest that those who identify highly with their ingroup/national identity and less with superordinate identities take distance from others and this is related to their perception of threat. In our study we used a newly developed questionnaire, the Multiple Threat and Prejudice Questionnaire (MTPQ) which measure identity threat at different dimensions of identification (national, existential, gender, religious) and the distancing of different outgroups, over and above we worked with Social Dominance Orientation (SDO) and Identification with All Humanity Scale (IWAH). We conduct one data collection (N=1482) in a Hungarian sample to examine the connection between national threat and distance-taking, and this survey includes the investigation (N=218) of identification with different group categories. Our findings confirmed that those who feel themselves threatened in their national identity aspects are less likely to identify themselves with superordinate groups and this correlation is much stronger when they think about the nation as a bio-cultural unit, while if nation defined as a social-economy entity this connection is less powerful and has just the opposite direction.Keywords: group boundaries, identity threat, prejudice, superordinate groups
Procedia PDF Downloads 410872 Identification of a Novel Maize Dehydration-Responsive Gene with a Potential Role in Improving Maize Drought Tolerance
Authors: Kyle Phillips, Ndiko Ludidi
Abstract:
Global climate change has resulted in altered rainfall patterns, which has resulted in annual losses in maize crop yields due to drought. Therefore it is important to produce maize cultivars that are more drought-tolerant, which is not an easily accomplished task as plants have a plethora of physical and biochemical adaptation methods. One such mechanism is the drought-induced expression of enzymatic and non-enzymatic proteins which assist plants to resist the effects of drought on their growth and development. One of these proteins is AtRD22 which has been identified in Arabidopsis thaliana. Using an in silico approach, a maize protein with 48% sequence homology to AtRD22 has been identified. This protein appears to be localized in the extracellular matrix, similarly to AtRD22. Promoter analysis of the encoding gene reveals cis-acting elements suggestive of induction of the gene’s expression by abscisic acid (ABA). Semi-quantitative transcriptomic analysis of the putative maize RD22 has revealed an increase in transcript levels after the exposure to drought. Current work elucidates the effect of up-regulation and silencing of the maize RD22 gene on the tolerance of maize to drought. The potential role of the maize RD22 gene in maize drought tolerance can be used as a tool to improve food security.Keywords: abscisic acid, drought-responsive cis-acting elements, maize drought tolerance, RD22
Procedia PDF Downloads 464871 Meeting India's Energy Demand: U.S.-India Energy Cooperation under Trump
Authors: Merieleen Engtipi
Abstract:
India's total share of global population is nearly 18%; however, its per capita energy consumption is only one-third of global average. The demand and supply of electricity are uneven in the country; around 240 million of the population have no access to electricity. However, with India's trajectory for modernisation and economic growth, the demand for energy is only expected to increase. India is at a crossroad, on the one hand facing the increasing demand for energy and on the other hand meeting the Paris climate policy commitments, and further the struggle to provide efficient energy. This paper analyses the policies to meet India’s need for energy, as the per capita energy consumption is likely to be double in 6-7 years period. Simultaneously, India's Paris commitment requires curbing of carbon emission from fossil fuels. There is an increasing need for renewables to be cheaply and efficiently available in the market and for clean technology to extract fossil fuels to meet climate policy goals. Fossil fuels are the most significant generator of energy in India; with the Paris agreement, the demand for clean energy technology is increasing. Finally, the U.S. decided to withdraw from the Paris Agreement; however, the two countries plan to continue engaging bilaterally on energy issues. The U.S. energy cooperation under Trump administration is significantly vital for greater energy security, transfer of technology and efficiency in energy supply and demand.Keywords: energy demand, energy cooperation, fossil fuels, technology transfer
Procedia PDF Downloads 252870 Comprehensive Review of Adversarial Machine Learning in PDF Malware
Authors: Preston Nabors, Nasseh Tabrizi
Abstract:
Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion
Procedia PDF Downloads 39869 Complementary Child-Care by Grandparents: Comparisons of Zambia and the Netherlands
Authors: Francis Sichimba
Abstract:
Literature has increasingly acknowledged the important role that grandparents play in child care with evidence highlighting differences in grand-parental investment between countries and cultures. However, there are very few systematic cross cultural studies on grandparents’ participation in child care. Thus, we decided to conduct this study in Zambia and the Netherlands because the two countries differ rather drastically socially and culturally. The objective of this study was to investigate grand-parental involvement in child care in Zambia and the Netherlands. In line with the general objective, four hypotheses were formulated using nationality, family size, social economic status (SES), attachment security as independent variables. The study sample consisted of 411 undergraduate students from the University of Zambia and the University of Leiden. A questionnaire was used to measure grand-parental involvement in child care. Results indicated that grandparent involvement in child care was prevalent in both Zambia and Netherlands. However, as predicted it was found that Zambian grandparents (M = 9.69, SD=2.40) provided more care for their grandchildren compared to their Dutch counterparts (M = 7.80, SD=3.31) even after controlling for parents being alive. Using hierarchical logistic regression analysis the study revealed that nationality and attachment-related avoidance were significant predictors of grand-parental involvement in child care. It was concluded that grand-parental care is a great resource in offering complementary care in both countries.Keywords: attachment, care, grand-parenting involvement, social economic status
Procedia PDF Downloads 721868 Explaining the Changes in Contentious Politics of China: A Comparative Study of Falun Gong and 'Diaosi'
Authors: Larry Lai, Evans Leung
Abstract:
Falun gong is a self-proclaimed religious group that has been under crackdown by Beijing for more than two decades. Diaosi, on the other hand, is an emerging community with members loosely connected on the internet through different online social platforms, centering around the sharing of different hobbies and interests. Diaosi community has been transformed from a potential threat to the Chinese authority for different causes to a pro-government force. This paper seeks to explain the different strategies adopted by the People's Republic of China (PRC) regime in handling these two potential threatening communities. Both communities share some obvious similarities: (1) both have massive nation-wide participation; (2) both have attempted to challenge the PRC's authority through contentious means; (3) both have high level of mobility, online or offline; and (4) both have at first been unnoticed until the threat against the PRC have taken form. But the strategies the PRC endorsed against the communities were, in many ways, different. The question is: if the strategy against Falun Gong has been an effective one, why used other strategies against Diaosi? The authors argue that the main reason for using different strategies lies in the differences between the two communities in terms of (i) the nature of the groups, and (ii) the group dynamics. Lastly, based on this analysis, the authors attempt to explore the possible strategies that the PRC would adopt against the Hong Kong cyber-world political community in light of the latest national security law in Hong Kong.Keywords: contentious politics, Diaosi, Falun Gong, Hong Kong, People's Republic of China
Procedia PDF Downloads 145867 Managing the Architectural Heritage of Tripoli-Libya: The Red Castle as a Case Study
Authors: Eman Mohamed Ali Elalwani
Abstract:
The Libyan heritage buildings are currently facing a number of crises that pose a threat to their structural integrity, functionality, and overall performance. One of the challenges pertains to the loss of community identity, which has arisen due to the lack of awareness and unconscious behavior of the residents. An additional issue arises from inadequate site management practices, including the implementation of modern techniques and innovative building materials that are incompatible with structural elements, resulting in the deformation of certain sections of the buildings. The security concerns of the city, along with the ongoing civil conflict, fostered a conducive environment for violations, resulting in the vandalism of certain monuments in the city. However, the degradation of this valuable heritage is mainly attributed to the city's neglect and pollution. The elevated groundwater level resulting from pollution has led to erosion in the building's foundations. Mitigating these negative consequences through strategic interventions and rehabilitation is required to preserve this treasure. In order to assist the local community in recovering from those crises, this paper stated a viable strategy for promoting preservation efforts that aimed at safeguarding the heritage sites while also providing guidance to decision-makers and the local community on how to avoid these crises, preserve, enhance, and recognize the significance of the Libyan heritage.Keywords: cultural heritage, historical buildings, Tripoli’s old city, Red Castle, crises, preservation
Procedia PDF Downloads 126866 The Effect of Artificial Intelligence on the Production of Agricultural Lands and Labor
Authors: Ibrahim Makram Ibrahim Salib
Abstract:
Agriculture plays an essential role in providing food for the world's population. It also offers numerous benefits to countries, including non-food products, transportation, and environmental balance. Precision agriculture, which employs advanced tools to monitor variability and manage inputs, can help achieve these benefits. The increasing demand for food security puts pressure on decision-makers to ensure sufficient food production worldwide. To support sustainable agriculture, unmanned aerial vehicles (UAVs) can be utilized to manage farms and increase yields. This paper aims to provide an understanding of UAV usage and its applications in agriculture. The objective is to review the various applications of UAVs in agriculture. Based on a comprehensive review of existing research, it was found that different sensors provide varying analyses for agriculture applications. Therefore, the purpose of the project must be determined before using UAV technology for better data quality and analysis. In conclusion, identifying a suitable sensor and UAV is crucial to gather accurate data and precise analysis when using UAVs in agriculture.Keywords: agriculture land, agriculture land loss, Kabul city, urban land expansion, urbanization agriculture yield growth, agriculture yield prediction, explorative data analysis, predictive models, regression models drone, precision agriculture, farmer income
Procedia PDF Downloads 75