Search results for: cyber hygiene
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 566

Search results for: cyber hygiene

326 Urban Planning Patterns after (COVID-19): An Assessment toward Resiliency

Authors: Mohammed AL-Hasani

Abstract:

The Pandemic COVID-19 altered the daily habits and affected the functional performance of the cities after this crisis leaving remarkable impacts on many metropolises worldwide. It is so obvious that having more densification in the city leads to more threats altering this main approach that was called for achieving sustainable development. The main goal to achieve resiliency in the cities, especially in forcing risks, is to deal with a planning system that is able to resist, absorb, accommodate and recover from the impacts that had been affected. Many Cities in London, Wuhan, New York, and others worldwide carried different planning approaches and varied in reaction to safeguard the impacts of the pandemic. The cities globally varied from the radiant pattern predicted by Le Corbusier, or having multi urban centers more like the approach of Frank Lloyd Wright’s Broadacre City, or having linear growth or gridiron expansion that was common by Doxiadis, compact pattern, and many other hygiene patterns. These urban patterns shape the spatial distribution and Identify both open and natural spaces with gentrified and gentrifying areas. This crisis paid attention to reassess many planning approaches and examine the existing urban patterns focusing more on the aim of continuity and resiliency in managing the crises within the rapid transformation and the power of market forces. According to that, this paper hypothesized that those urban planning patterns determine the method of reaction in assuring quarantine for the inhabitance and the performance of public services and need to be updated through carrying out an innovative urban management system and adopt further resilience patterns in prospective urban planning approaches. This paper investigates the adaptivity and resiliency of variant urban planning patterns regarding selected cities worldwide that affected by COVID-19 and their role in applying certain management strategies in controlling the pandemic spread, finding out the main potentials that should be included in prospective planning approaches. The examination encompasses the spatial arrangement, blocks definition, plots arrangement, and urban space typologies. This paper aims to investigate the urban patterns to deliberate also the debate between densification as one of the more sustainable planning approaches and disaggregation tendency that was followed after the pandemic by restructuring and managing its application according to the assessment of the spatial distribution and urban patterns. The biggest long-term threat to dense cities proves the need to shift to online working and telecommuting, creating a mixture between using cyber and urban spaces to remobilize the city. Reassessing spatial design and growth, open spaces, urban population density, and public awareness are the main solutions that should be carried out to face the outbreak in our current cities that should be managed from global to tertiary levels and could develop criteria for designing the prospective cities

Keywords: COVID-19, densification, resiliency, urban patterns

Procedia PDF Downloads 103
325 A Concept for Flexible Battery Cell Manufacturing from Low to Medium Volumes

Authors: Tim Giesen, Raphael Adamietz, Pablo Mayer, Philipp Stiefel, Patrick Alle, Dirk Schlenker

Abstract:

The competitiveness and success of new electrical energy storages such as battery cells are significantly dependent on a short time-to-market. Producers who decide to supply new battery cells to the market need to be easily adaptable in manufacturing with respect to the early customers’ needs in terms of cell size, materials, delivery time and quantity. In the initial state, the required output rates do not yet allow the producers to have a fully automated manufacturing line nor to supply handmade battery cells. Yet there was no solution for manufacturing battery cells in low to medium volumes in a reproducible way. Thus, in terms of cell format and output quantity, a concept for the flexible assembly of battery cells was developed by the Fraunhofer-Institute for Manufacturing Engineering and Automation. Based on clustered processes, the modular system platform can be modified, enlarged or retrofitted in a short time frame according to the ordered product. The paper shows the analysis of the production steps from a conventional battery cell assembly line. Process solutions were found by using I/O-analysis, functional structures, and morphological boxes. The identified elementary functions were subsequently clustered by functional coherences for automation solutions and thus the single process cluster was generated. The result presented in this paper enables to manufacture different cell products on the same production system using seven process clusters. The paper shows the solution for a batch-wise flexible battery cell production using advanced process control. Further, the performed tests and benefits by using the process clusters as cyber-physical systems for an integrated production and value chain are discussed. The solution lowers the hurdles for SMEs to launch innovative cell products on the global market.

Keywords: automation, battery production, carrier, advanced process control, cyber-physical system

Procedia PDF Downloads 303
324 Two-Level Graph Causality to Detect and Predict Random Cyber-Attacks

Authors: Van Trieu, Shouhuai Xu, Yusheng Feng

Abstract:

Tracking attack trajectories can be difficult, with limited information about the nature of the attack. Even more difficult as attack information is collected by Intrusion Detection Systems (IDSs) due to the current IDSs having some limitations in identifying malicious and anomalous traffic. Moreover, IDSs only point out the suspicious events but do not show how the events relate to each other or which event possibly cause the other event to happen. Because of this, it is important to investigate new methods capable of performing the tracking of attack trajectories task quickly with less attack information and dependency on IDSs, in order to prioritize actions during incident responses. This paper proposes a two-level graph causality framework for tracking attack trajectories in internet networks by leveraging observable malicious behaviors to detect what is the most probable attack events that can cause another event to occur in the system. Technically, given the time series of malicious events, the framework extracts events with useful features, such as attack time and port number, to apply to the conditional independent tests to detect the relationship between attack events. Using the academic datasets collected by IDSs, experimental results show that the framework can quickly detect the causal pairs that offer meaningful insights into the nature of the internet network, given only reasonable restrictions on network size and structure. Without the framework’s guidance, these insights would not be able to discover by the existing tools, such as IDSs. It would cost expert human analysts a significant time if possible. The computational results from the proposed two-level graph network model reveal the obvious pattern and trends. In fact, more than 85% of causal pairs have the average time difference between the causal and effect events in both computed and observed data within 5 minutes. This result can be used as a preventive measure against future attacks. Although the forecast may be short, from 0.24 seconds to 5 minutes, it is long enough to be used to design a prevention protocol to block those attacks.

Keywords: causality, multilevel graph, cyber-attacks, prediction

Procedia PDF Downloads 136
323 The Causes and Effects of Poor Household Sanitation: Case Study of Kansanga Parish

Authors: Rosine Angelique Uwacu

Abstract:

Poor household sanitation is rife in Uganda, especially in Kampala. This study was carried out with he goal of establishing the main causes and effects of poor household sanitation in Kansanga parish. The study objectively sought to: To identify various ways through which wastes are generated and disposed of in Kansanga parish, identify different hygiene procedures/behaviors of waste handling in Kansanga parish and assess health effects of poor household sanitation and suggest the recommended appropriate measures of addressing cases of lack of hygiene in Kansanga parish. The study used a survey method where cluster sampling was employed. This is because there is no register of population or sufficient information, or geographic distribution of individuals is widely scattered. Data was collected through the use of interviews accompanied by observation and questionnaires. The study involved a sample of 100 households. The study revealed that; some households use wheeled bin collection, skip hire and roll on/off contained others take their wastes to refuse collection vehicles. Surprisingly, majority of the households submitted that they use polythene bags 'Kavera' and at times plastic sacs to dispose of their wastes which are dumped in drainage patterns or dustbins and other illegal dumping site. The study showed that washing hands with small jerrycans after using the toilet was being adopted by most households as there were no or few other alternatives. The study revealed that the common health effects that come as a result of poor household sanitation in Kansanga Parish are diseases outbreaks such as malaria, typhoid and diarrhea. Finally, the study gave a number of recommendations or suggestions on maintaining and achieving an adequate household sanitation in Kansanga Parish such as sensitization of community members by their leaders like Local Counselors could help to improve the situation, establishment of community sanitation days for people to collectively and voluntarily carry out good sanitation practices like digging trenches, burning garbage and proper waste management and disposal. Authorities like Kampala Capital City Authority should distribute dumping containers or allocate dumping sites where people can dispose of their wastes preferably at a minimum cost for proper management.

Keywords: household sanitation, kansanga parish, Uganda, waste

Procedia PDF Downloads 164
322 The Employer Brand as Perceived by Salespeople: A Study Based on Glassdoor Reviews

Authors: Juliet F. Poujol, Jeff John Tanner, Christophe Fournier

Abstract:

Employers desire a favorable brand as an employer. This research considers whether motivation theory is applied to identify universally desirable employer brand elements. Based on data from a website where employees give their opinion about their employer (N=200), this research examines what salespeople found positive and negative about their job. Results show that traditional motivators like opportunities of advancement, and 'hygiene' factors such as benefits and work conditions are a source of satisfaction for salespeople. We also found differences by sectors. Implications are related to sales force recruitment and management.

Keywords: employer brand, motivation, qualitative study, salespeople

Procedia PDF Downloads 355
321 In silico Statistical Prediction Models for Identifying the Microbial Diversity and Interactions Due to Fixed Periodontal Appliances

Authors: Suganya Chandrababu, Dhundy Bastola

Abstract:

Like in the gut, the subgingival microbiota plays a crucial role in oral hygiene, health, and cariogenic diseases. Human activities like diet, antibiotics, and periodontal treatments alter the bacterial communities, metabolism, and functions in the oral cavity, leading to a dysbiotic state and changes in the plaques of orthodontic patients. Fixed periodontal appliances hinder oral hygiene and cause changes in the dental plaques influencing the subgingival microbiota. However, the microbial species’ diversity and complexity pose a great challenge in understanding the taxa’s community distribution patterns and their role in oral health. In this research, we analyze the subgingival microbial samples from individuals with fixed dental appliances (metal/clear) using an in silico approach. We employ exploratory hypothesis-driven multivariate and regression analysis to shed light on the microbial community and its functional fluctuations due to dental appliances used and identify risks associated with complex disease phenotypes. Our findings confirm the changes in oral microbiota composition due to the presence and type of fixed orthodontal devices. We identified seven main periodontic pathogens, including Bacteroidetes, Actinobacteria, Proteobacteria, Fusobacteria, and Firmicutes, whose abundances were significantly altered due to the presence and type of fixed appliances used. In the case of metal braces, the abundances of Bacteroidetes, Proteobacteria, Fusobacteria, Candidatus saccharibacteria, and Spirochaetes significantly increased, while the abundance of Firmicutes and Actinobacteria decreased. However, in individuals With clear braces, the abundance of Bacteroidetes and Candidatus saccharibacteria increased. The highest abundance value (P-value=0.004 < 0.05) was observed with Bacteroidetes in individuals with the metal appliance, which is associated with gingivitis, periodontitis, endodontic infections, and odontogenic abscesses. Overall, the bacterial abundances decrease with clear type and increase with metal type of braces. Regression analysis further validated the multivariate analysis of variance (MANOVA) results, supporting the hypothesis that the presence and type of the fixed oral appliances significantly alter the bacterial abundance and composition.

Keywords: oral microbiota, statistical analysis, fixed or-thodontal appliances, bacterial abundance, multivariate analysis, regression analysis

Procedia PDF Downloads 162
320 Efficient Elimination of Common Allergens through the Application of Dry Microfine Steam on Innate Surfaces

Authors: O. Rachinel, C. Recchia, M. Bourel, B. Recchia

Abstract:

Dry microfine steam (DMS) technology, developed by Laurastar, was shown to effectively eliminate a range of pathogens such as Sars-CoV-2, E. coli, S. aureus and C. Albicans. The aim of this study was to investigate the effect of DMS technology on allergens. Therefore, the application of the DMS technology was tested on two common allergens (Dermatophagoides pteronyssinus and cat allergen Fel d 1), on different inert surfaces (e.g., cotton), during 2 to 3 seconds. Quantification of the remaining allergens was performed and the reduction rates reached 100% in 3 seconds for D. pteronyssinus and 97,74% in 2 seconds for cat allergens. In conclusion, DMS showed high efficacy in the elimination of common allergens and could be seen as a natural solution to improve domestic hygiene and reduce allergies.

Keywords: steam, allergens, dust mites, pollens

Procedia PDF Downloads 114
319 Application of Modulo-2 Arithmetic in Securing Communicated Messages throughout the Globe

Authors: Ejd Garba, Okike Benjamin

Abstract:

Today, the word encryption has become very popular even among non-computer professionals. There is no doubt that some works have been carried out in this area, but more works need to be done. Presently, most of the works on encryption is concentrated on the sender of the message without paying any attention to the message recipient. However, it is a good practice if any message sent to someone is received by the particular person whom the message is sent to. This work seeks to ensure that at the receiving end of the message, there is a security to ensure that the recipient computes a key that would enable the encrypted message to be accessed. This key would be in form of password. This would make it possible for a given message to be sent to several people at the same time. When this happens, it is only those people who computes the key correctly that would be given the opportunity to access even the encrypted message, which can in turn be decrypted using the appropriate key.

Keywords: arithmetic, cyber space, modulo-2, information security

Procedia PDF Downloads 283
318 A Descriptive Study to Assess the Knowledge Regarding Prevention and Management of Methicillin-Resistant Staphylococcus Aureus (MRSA) Infections Among Nursing Officers in a Selected Hospital, Bengaluru

Authors: Maneesha Pahlani, Najmin Sultana

Abstract:

A hospital is one of the most suitable places for acquiring an infection because it harbors a high population of virulent strains of microorganisms that may be resistant to antibiotics, especially the prevalence of Methicillin-Resistant Staphylococcus Aureus (MRSA) infections. The hospital-acquired infection has become a global challenge. In developed countries, healthcare-associated infections occur in 5-15% of hospitalized clients, affecting 9-37% of those admitted to intensive care units (ICU). A non-experimental descriptive study was conducted among 50 nursing officers working in a selected hospital in Bangalore to assess the nursing officers’ level of knowledge regarding the prevention and management of MRSA infections and to associate the pre-test knowledge mean scores of nursing officers with selected socio-demographic variables. Data was collected using a structured questionnaire consisting of socio-demographic data and a structured questionnaire on knowledge regarding the prevention and management of MRSA infections. The data was analyzed in terms of frequencies and percentages for the analysis of demographic variables and computing chi-square to determine the association between knowledge means scores and selected demographic variables. The study findings revealed that the nursing officer had an overall good level of knowledge (63.05%) regarding the prevention and management of MRSA infections, and there is no significant association found between the level of knowledge mean scores for prevention and management of MRSA infection with the selected socio-demographic variables. However, the categorization of knowledge items showed that the nursing officer must thoroughly receive education on correct guidance and information regarding MRSA infection control policy, including measures and practices on hygiene precautions and information regarding antibiotic resistance for effective nursing care to patients with MRSA infections. The conclusions drawn from the study findings showed that it is necessary that the nursing officer thoroughly receive education on correct guidance and information regarding MRSA infection control policy, including measures and practices on hygiene precautions and information regarding antibiotic resistance to provide effective nursing care to patients with MRSA infection as they constantly care for the patient who can be at risk for multi-drug resistance organisms to reduce the risk of MRSA infection in hospital care settings as well community settings.

Keywords: MRSA, nursing officers, knowledge, preventive and management

Procedia PDF Downloads 40
317 A Descriptive Study to Assess the Knowledge Regarding Prevention and Management of Methicillin-Resistant Staphylococcus Aureus Infections Among Nursing Officers in a Selected Hospital, Bengaluru.

Authors: Najmin Sultana, Maneesha Pahlani

Abstract:

A hospital is one of the most suitable places for acquiring an infection because it harbors a high population of virulent strains of microorganisms that may be resistant to antibiotics, especially the prevalence of Methicillin-Resistant Staphylococcus Aureus (MRSA) infections. The hospital-acquired infection has become a global challenge. In developed countries, healthcare-associated infections occur in 5-15% of hospitalized clients, affecting 9-37% of those admitted to intensive care units (ICU). A non-experimental descriptive study was conducted among 50 nursing officers working in a selected hospital in bengaluru to assess the nursing officers’ level of knowledge regarding the prevention and management of MRSA infections and to associate the pre-test knowledge mean scores of nursing officers with selected socio-demographic variables. Data was collected using a structured questionnaire consisting of socio-demographic data and a structured questionnaire on knowledge regarding the prevention and management of MRSA infections. The data was analyzed in terms of frequencies and percentages for the analysis of demographic variables and computing chi-square to determine the association between knowledge means scores and selected demographic variables. The study findings revealed that the nursing officer had an overall good level of knowledge (63.05%) regarding the prevention and management of MRSA infections, and there is no significant association found between the level of knowledge mean scores for prevention and management of MRSA infection with the selected socio-demographic variables. However, the categorization of knowledge items showed that the nursing officer must thoroughly receive education on correct guidance and information regarding MRSA infection control policy, including measures and practices on hygiene precautions and information regarding antibiotic resistance for effective nursing care to patients with MRSA infections. The conclusions drawn from the study findings showed that it is necessary that the nursing officer thoroughly receive education on correct guidance and information regarding MRSA infection control policy, including measures and practices on hygiene precautions and information regarding antibiotic resistance to provide effective nursing care to patients with MRSA infection as they constantly care for the patient who can be at risk for multi-drug resistance organisms to reduce the risk of MRSA infection in hospital care settings as well community settings.

Keywords: MRSA, knowledge, nursing officers', prevention and management

Procedia PDF Downloads 35
316 Analyze the Properties of Different Surgical Sutures

Authors: Doaa H. Elgohary, Tamer F. Khalifa, Mona M. Salem, M. A. Saad, Ehab Haider Sherazy

Abstract:

Textiles have conquered new areas over the past three decades, including agriculture, transportation, filtration, military, and medicine. The use of textiles in the medical field has increased significantly in recent years and covers almost everything. Medical textiles represent a huge market as they are widely used not only in hospitals, hygiene, and healthcare but also in hotels and other environments where hygiene is required. However, not all fibers are suitable for the manufacture of medical textile products. Some special properties are required for the manufactured materials, e.g. Strength, elasticity, spinnability, etc. In addition to the usual properties of medical fibers, non-toxicity, sterilizability, biocompatibility, biodegradability, good absorbability, softness, and freedom from additives, etc., desirable properties include impurities. Stitching is one of the most common practices in the medical field. as it is a biomaterial device, either natural or synthetic, used to connect blood vessels and connect tissues. In addition to being very strong, suture material should easily dissolve in bodily fluids and lose strength as the tissue gains strength. In this work, a study to select the most used materials for sutures, it was found that silk, VICRYL and polypropylene were the most used materials in varying numbers. The research involved the analysis of 36 samples from three different materials (mostly commonly used), the tests were carried out on 36 imported samples for four different companies. Each company supplied three different materials (silk, VICRYL and polypropylene) with three different gauges (4, 3.5 and 3 metric). The results of the study were tabulated, presented, and discussed. Practical statistical science serves to support the practical analysis of experimental work products and the various relationships between variables to achieve the best sampling performance with the functional purpose generated for it. Analysis of the imported sutures shows that VICRYL sutures had the highest tensile strength, toughness, knot tensile strength and knot toughness, followed by polypropylene and silk. As yarn counts, weight and diameter increase, its tensile strength and toughness increase while its elongation and knot tension decrease. The multifilament yarn construction (silk and VICRYL) scores higher compared to the monofilament construction (polypropylene), resulting in increases in tenacity, toughness, knot tensile strength and knot toughness.

Keywords: biodegradable yarns, braided sutures, irritation, knot tying, medical textiles, surgical sutures, wound healing

Procedia PDF Downloads 37
315 Market Acceptance of Irradiated Food in the City of Piracicaba, Brazil

Authors: Vanessa de Cillos Silva, Fabrício José Piacente, Sônia Maria De Stefano Piedade, Valter Arthur

Abstract:

The increasing concern in relation to safety and hygiene of food consumption makes it so that food conservation is studied. Food radiation is a technique used for conservation, but many consumers associate this technique with dangers such as environmental contamination and development of diseases. This research had the objective of evaluating the acceptance of radiated products by the consumer market in the city of Piracicaba/SP-Brasil. The methodology adopted was the application of a questionnaire in the city’s supermarkets. After the application, the data was tabulated and analyzed. It was observed that the majority of interviewees would not eat irradiated food. The unfamiliarity and questions about the safety of irradiated food were the main causes of your rejection.

Keywords: irradiation, questionnaire, storage, market acceptance

Procedia PDF Downloads 378
314 Microbiological Quality and Safety of Meatball Sold in Payakumbuh City, West Sumatra, Indonesia

Authors: Ferawati, H. Purwanto, Y. F. Kurnia, E. Purwati

Abstract:

The aim of this study was to evaluate the microbiological quality and safety of meatball obtained from five different manufacturers around Payakumbuh City, West Sumatra, Indonesia. Microbiological analysis of meatball sample resulted in aerobic plate count range from 7 log CFU/gr to 8.623 log CFU/gr, respectively. Total coliform ranges from 1.041 log Most Probable Number (MPN)/gr to 3.380 log MPN/gr, respectively. Chemical analysis of meatball sample consisted of borax and formalin content. The result of qualitative detection of borax and formalin content on all meatball samples were not detected. Thus, it remains essential to include the significance of effective hygiene practices as an important safety measure in consumer education programmes.

Keywords: borax, formalin, meatball, microbiological quality

Procedia PDF Downloads 263
313 Liability of AI in Workplace: A Comparative Approach Between Shari’ah and Common Law

Authors: Barakat Adebisi Raji

Abstract:

In the workplace, Artificial Intelligence has, in recent years, emerged as a transformative technology that revolutionizes how organizations operate and perform tasks. It is a technology that has a significant impact on transportation, manufacturing, education, cyber security, robotics, agriculture, healthcare, and so many other organizations. By harnessing AI technology, workplaces can enhance productivity, streamline processes, and make more informed decisions. Given the potential of AI to change the way we work and its impact on the labor market in years to come, employers understand that it entails legal challenges and risks despite the advantages inherent in it. Therefore, as AI continues to integrate into various aspects of the workplace, understanding the legal and ethical implications becomes paramount. Also central to this study is the question of who is held liable where AI makes any defaults; the person (company) who created the AI, the person who programmed the AI algorithm or the person who uses the AI? Thus, the aim of this paper is to provide a detailed overview of how AI-related liabilities are addressed under each legal tradition and shed light on potential areas of accord and divergence between the two legal cultures. The objectives of this paper are to (i) examine the ability of Common law and Islamic law to accommodate the issues and damage caused by AI in the workplace and the legality of compensation for such injury sustained; (ii) to discuss the extent to which AI can be described as a legal personality to bear responsibility: (iii) examine the similarities and disparities between Common Law and Islamic Jurisprudence on the liability of AI in the workplace. The methodology adopted in this work was qualitative, and the method was purely a doctrinal research method where information is gathered from the primary and secondary sources of law, such as comprehensive materials found in journal articles, expert-authored books and online news sources. Comparative legal method was also used to juxtapose the approach of Islam and Common Law. The paper concludes that since AI, in its current legal state, is not recognized as a legal entity, operators or manufacturers of AI should be held liable for any damage that arises, and the determination of who bears the responsibility should be dependent on the circumstances surrounding each scenario. The study recommends the granting of legal personality to AI systems, the establishment of legal rights and liabilities for AI, the establishment of a holistic Islamic virtue-based AI ethics framework, and the consideration of Islamic ethics.

Keywords: AI, health- care, agriculture, cyber security, common law, Shari'ah

Procedia PDF Downloads 8
312 Fears of Strangers: Causes of Anonymity Rejection on Virtual World

Authors: Proud Arunrangsiwed

Abstract:

This research is a collaborative narrative research, which is mixed with issues of selected papers and researcher's experience as an anonymous user on social networking sites. The objective of this research is to understand the reasons of the regular users who reject to contact with anonymous users, and to study the communication traditions used in the selected studies. Anonymous users are rejected by regular users, because of the fear of cyber bully, the fear of unpleasant behaviors, and unwillingness of changing communication norm. The suggestion for future research design is to use longitudinal design or quantitative design; and the theory in rhetorical tradition should be able to help develop a strong trust message.

Keywords: anonymous, anonymity, online identity, trust message, reliability

Procedia PDF Downloads 339
311 Biological Institute Actions for Bovine Mastitis Monitoring in Low Income Dairy Farms, Brazil: Preliminary Data

Authors: Vanessa Castro, Liria H. Okuda, Daniela P. Chiebao, Adriana H. C. N. Romaldini, Harumi Hojo, Marina Grandi, Joao Paulo A. Silva, Alessandra F. C. Nassar

Abstract:

The Biological Institute of Sao Paulo, in partnership with a private company, develops an Animal Health Family Farming Program (Prosaf) to enable communication among smallholder farmers and scientists, on-farm consulting and lectures, solving health questions that will benefit agricultural productivity. In Vale do Paraiba region, a dairy region of Sao Paulo State, southern Brazil, many of these types of farms are found with several milk quality problems. Most of these farms are profit-based business; however, with non-technified cattle rearing systems and uncertain veterinary assistance. Feedback from Prosaf showed that the biggest complaints from farmers were low milk production, sick animals and, mainly, loss of selling price due to a high somatic cell count (SCC) and a total bacterial count (TBC). The aims of this study were to improve milk quality, animal hygiene and herd health status by adjustments into general management practices and introducing techniques of sanitary control and milk monitoring in five dairy farms from Sao Jose do Barreiro municipality, Sao Paulo State, Brazil, to increase their profits. A total of 119 milk samples from 56 animals positive for California Mastitis Test (CMT) were collected. The positive CMT indicates subclinical mastitis, therefore laboratorial exams were performed in the milk (microbiological, biochemical and antibiogram test) detect the presence of Staphylococcus aureus (41.8%), Bacillus sp. (11.8%), Streptococcus sp. (2.1%), nonfermenting, motile and oxidase-negative Gram-negative Bacilli (2.1%) and Enterobacter (2.1%). Antibiograms revealed high resistance to gentamicin and streptomycin, probably due to indiscriminate use of antibiotics without veterinarian prescription. We suggested the improvement of hygiene management in the complete milking and cooling tanks system. Using the results of the laboratory tests, animals were properly treated, and the effects observed were better CMT outcomes, lower SCCs, and TBCs leading to an increase in milk pricing. This study will have a positive impact on the family farmers from Sao Paulo State dairy region by improving their market milk competitiveness.

Keywords: milk, family farming, food quality, antibiogram, profitability

Procedia PDF Downloads 120
310 A Qualitative Study on Cyberbullying and Traditional Bullying among Taiwanese High School Students

Authors: Chia-Wen Wang, Patou Masika Musumari, Teeranee Techasrivichien, S. Pilar Suguimoto, Chang-Chuan Chan, Masako Ono-Kihara, Masahiro Kihara

Abstract:

Background: In recent years, a particular form of bullying, referred to as 'cyberbullying' has emerged along with the rapid expansion of the Internet, social network services (SNSs) and smart phones. Many Asian countries, including Taiwan, are faced with both the cyberbullying and the traditional form of bullying. This study aims to explore Taiwanese adolescents’ experiences, perceptions and opinions regarding cyberbullying and traditional bullying through the perspective of victim, perpetrator, or witness. Method: This is a qualitative study using face-to-face in-depth interviews guided by a semi-structured questionnaire among high school students -aged 16 to 18 years- in Taipei, Taiwan. The participants were recruited through convenience sampling from five high schools between June and November 2016. Interviews were digitally recorded, transcribed, and analyzed using the thematic analysis approach. Results: Forty-eight participants were recruited, of which, 14 (29.2%) reported had ever experienced bullying. Specifically, 7 participants (14.6%) reported had ever been victims of cyberbullying, 1 (2%) had been victims of traditional bullying, and 6 (12.5%) had been victims of both cyber and traditional bullying. The majority (70.8%) reported had ever witnessed acts of bullying; however, none of the participants recognized had ever been a perpetrator of bullying. Cyberbullying mostly happens on social media (Facebook and Instagram) or LINE instant messaging application, and included upload and sharing of degrading pictures and videos of victims, as well as gossip and mean messages by the perpetrators. The anonymous and public nature of social media groups in schools made it easier to perpetrate bullying. The victim of traditional bullying reported being the target of verbal attack because of his physical appearance. Regardless of the type of bullying, victims reported feeling bad, angry, or depressed as a result of being bullied. Witnesses of both cyber- and traditional bullying cited physical appearance (e.g. having the big/flat bust or big butt, or overweight or obese) and disability as the most reasons of being a bullying victim. Conclusion: Both cyberbullying and traditional bullying had negative emotional and psychological impacts on victims. This study warrants further research to assess the extent of this phenomenon and understand the characteristics of perpetrators, victims, and witnesses to inform the design of tailored interventions using appropriate channels of dissemination.

Keywords: cyberbullying, traditional bullying, social media, adolescents

Procedia PDF Downloads 316
309 An Approach of High Scalable Production Capacity by Adaption of the Concept 'Everything as a Service'

Authors: Johannes Atug, Stefan Braunreuther, Gunther Reinhart

Abstract:

Volatile markets, as well as increasing global competition in manufacturing, lead to a high demand of flexible and agile production systems. These advanced production systems in turn conduct to high capital expenditure along with high investment risks. Developments in production regarding digitalization and cyber-physical systems result to a merger of informational- and operational technology. The approach of this paper is to benefit from this merger and present a framework of a production network with scalable production capacity and low capital expenditure by adaptation of the IT concept 'everything as a service' into the production environment.

Keywords: digital manufacturing system, everything as a service, reconfigurable production, value network

Procedia PDF Downloads 312
308 Virucidal, Bactericidal and Fungicidal Efficiency of Dry Microfine Steam on Innate Surfaces

Authors: C. Recchia, M. Bourel, B. Recchia

Abstract:

Microorganisms (viruses, bacteria, fungi) are responsible for most communicable diseases, threatening human health. For domestic use, chemical agents are often criticized because of their potential dangerousness, and natural solutions are needed. Application of the “dry microfine steam” (DMS) technology was tested on a selection of common pathogens (SARS-CoV-2, enterovirus EV-71, human coronavirus 229E, E. coli, S. aureus, C. albicans), on different innate surfaces, for 5 to 10 seconds. Quantification of the remaining pathogens was performed, and the reduction rates ranged from 99.8% (S. aureus on plastic) to over 99.999%. DMS showed high efficacy in the elimination of common microorganisms and could be seen as a natural alternative to chemical agents to improve domestic hygiene.

Keywords: steam, SARS-CoV-2, bactericidal, virucidal, fungicidal, sterilization

Procedia PDF Downloads 141
307 CLEAN Jakarta Waste Bank Project: Alternative Solution in Urban Solid Waste Management by Community Based Total Sanitation (CBTS) Approach

Authors: Mita Sirait

Abstract:

Everyday Jakarta produces 7,000 tons of solid waste and only about 5,200 tons delivered to landfill out of the city by 720 trucks, the rest are left yet manageable, as reported by Government of Clean Sector. CLEAN Jakarta Project is aimed at empowering community to achieve healthy environment for children and families in urban slum in Semper Barat and Penjaringan sub-district of North Jakarta that consisted of 20,584 people. The project applies Community Based Total Sanitation, an approach to empowering community to achieve total hygiene and sanitation behaviour by triggering activities. As regulated by Ministry of Health, it has 5 pillars: (1) open defecation free, (2) hand-washing with soaps, (3) drinking-water treatment, (4) solid-waste management and (5) waste-water management; and 3 strategic components: 1) demand creation, 2) supply creation and 3) enabling environment. Demand creation is generated by triggering community’s reaction to their daily sanitation habits by exposing them to their surrounding where they can see faeces, waste and other environmental pollutant to stimulate disgusting, embarrassing and responsibility sense. Triggered people then challenged to commit to improving their hygiene practice such as to stop littering and start waste separation. In order to support this commitment, and for supply creation component, the project initiated waste bank with community working group. It facilitated capacity-building trainings, waste bank system formulation and meetings with local authorities to solicit land permit and waste bank decree. As it is of a general banking system, waste bank has customer service, teller, manager, legal paper and provides saving book and money transaction. In 8 months, two waste banks have established with 148 customers, 17 million rupiah cash, and about 9 million of stored recyclables. Approximately 2.5 tons of 15-35 types of recyclable are managed in both waste banks per week. On enabling environment, the project has initiated sanitation working group in community and multi sectors government level, and advocated both parties. The former is expected to promote behaviour change and monitoring in the community, while the latter is expected to support sanitation with regulations, strategies, appraisal and awards; to coordinate partnering and networking, and to replicate best practices to other areas.

Keywords: urban community, waste management, Jakarta, community based total sanitation (CBTS)

Procedia PDF Downloads 264
306 Epulis in Cat's Lips: Understanding the Causes, Symptoms, and Treatment Options

Authors: Sadaf Salek

Abstract:

Introduction: Cats are susceptible to various health conditions, and one such ailment that can affect their oral health is epulis in their lips. Epulis refers to a benign tumor or growth that can develop in different areas of a cat's mouth, including the lips. While epulis is not life-threatening, it can still cause discomfort and affect a cat's overall quality of life. This essay aims to delve into the causes, symptoms, and treatment options for epulis in cat's lips, shedding light on this lesser-known oral condition. Causes: Epulis in a cat's lips can have several causes. Firstly, genetic predisposition plays a significant role, with certain breeds being more prone to developing these growths. Secondly, chronic irritation to the mouth, such as from dental diseases or foreign objects, can also contribute to the development of epulis. Lastly, hormonal imbalances, specifically an excess of estrogen, have been associated with the occurrence of these tumors in cats. Understanding these causes can help cat owners take preventive measures to reduce the risk of epulis in their feline companions. Symptoms: Identifying the symptoms of epulis in a cat's lips is vital for early intervention and effective treatment. The most common symptoms include swelling, redness, and the presence of a visible growth or lump on the lip. Cats with epulis may also exhibit drooling, difficulty eating, and a reluctance to groom themselves. Any change in eating habits or oral behavior should not be overlooked and prompt a visit to the veterinarian for a thorough examination. Treatment ptions: When it comes to treating epulis in a cat's lips, various options are available, depending on the size, location, and characteristics of the growth. The primary treatment involves surgical removal of the tumor. This procedure should be performed by a qualified veterinarian, ensuring complete excision of the mass while preserving as much healthy tissue as possible. In some cases, radiation therapy may be necessary, especially if the tumor is large or aggressive. Additionally, a veterinarian may recommend oral hygiene care and regular dental cleaning to prevent further growths and maintain the cat's oral health. Prevention and Care: Preventing epulis in a cat's lips is not always possible, especially if genetic factors are involved. However, certain preventive measures can minimize the risk of these growths. Maintaining good oral hygiene through regular brushing and the use of appropriate dental products can help prevent chronic irritation and dental diseases. Routine veterinary check-ups should also include thorough oral examinations to detect any abnormal growths or changes in the mouth at an early stage. Pet owners should be observant and seek veterinary care promptly for any signs of discomfort or changes in eating habits. Conclusion: Epulis in a cat's lips is a condition that requires attention and proper treatment. Understanding the causes, identifying symptoms, and exploring treatment options are of utmost importance to help improve a cat's oral health and overall well-being.

Keywords: fibroma, cat, lip, epulis

Procedia PDF Downloads 23
305 Hidden Critical Risk in the Construction Industry’s Technological Adoption: Cybercrime

Authors: Nuruddeen Usman, Usman Mohammed Gidado, Muhammad Ahmad Ibrahim

Abstract:

Construction industry is one of the sectors that are eyeing adoption of ICT for its development due to the advancement in technology. Though, many manufacturing sectors had been using it, but construction industry was left behind, especially in the developing nation like Nigeria. On account of that, the objective of this study is to conceptually and quantitatively synthesise whether the slow adoption of ICT by the construction industries can be attributable to cybercrime threats. The result of the investigation found that, the risk of cybercrime, and lack of adequate cyber security policies that can enforce and punish defaulters are among the things that hinder ICT adoption of the Nigerian construction industries. Therefore, there is need for the nations to educate their citizens on cybercrime risk, and to establish cybercrime police units that can be monitoring and controlling all online communications.

Keywords: construction industry, cybercrime, information and communication technology adoption, risk

Procedia PDF Downloads 475
304 Smart Grids Cyber Security Issues and Challenges

Authors: Imen Aouini, Lamia Ben Azzouz

Abstract:

The energy need is growing rapidly due to the population growth and the large new usage of power. Several works put considerable efforts to make the electricity grid more intelligent to reduce essentially energy consumption and provide efficiency and reliability of power systems. The Smart Grid is a complex architecture that covers critical devices and systems vulnerable to significant attacks. Hence, security is a crucial factor for the success and the wide deployment of Smart Grids. In this paper, we present security issues of the Smart Grid architecture and we highlight open issues that will make the Smart Grid security a challenging research area in the future.

Keywords: smart grids, smart meters, home area network, neighbor area network

Procedia PDF Downloads 395
303 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 200
302 Insider Theft Detection in Organizations Using Keylogger and Machine Learning

Authors: Shamatha Shetty, Sakshi Dhabadi, Prerana M., Indushree B.

Abstract:

About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring.

Keywords: cyber security, machine learning, cyclic process, email notification

Procedia PDF Downloads 28
301 The Evaluation of Sexual Literacy Teacher Training Program in Thai Teachers

Authors: Chitraporn Boonthanom, Pailin Sisookho

Abstract:

The Sexual Literacy Training Teachers Program (SLTTP) based on sexual health problems in Thai students includes sexual development, sexual hygiene, high-risk behaviors, Sexual Transmitter Infections and HIV/AIDS, unwanted pregnancy, unsafe abortion, and sexual abuse that increase among Thai students. The training aimed at providing teachers with the sexuality knowledge, sexuality information access skills, communication skill to effectively teach in their class. 28 teachers were participated from schools in Bangkok metropolitan and Nakorn Patom province. The result show the mean score of the pre-test was 8.46 (SD=1.77) and the post-test was 10.13 (SD=2.34). The post-training results were found to be higher than pre–training results but not significant. As teachers are increasing the sexual literacy is very important for Thai students.

Keywords: sexual literacy, teachers, training, sexuality education

Procedia PDF Downloads 330
300 An Analytical Metric and Process for Critical Infrastructure Architecture System Availability Determination in Distributed Computing Environments under Infrastructure Attack

Authors: Vincent Andrew Cappellano

Abstract:

In the early phases of critical infrastructure system design, translating distributed computing requirements to an architecture has risk given the multitude of approaches (e.g., cloud, edge, fog). In many systems, a single requirement for system uptime / availability is used to encompass the system’s intended operations. However, when architected systems may perform to those availability requirements only during normal operations and not during component failure, or during outages caused by adversary attacks on critical infrastructure (e.g., physical, cyber). System designers lack a structured method to evaluate availability requirements against candidate system architectures through deep degradation scenarios (i.e., normal ops all the way down to significant damage of communications or physical nodes). This increases risk of poor selection of a candidate architecture due to the absence of insight into true performance for systems that must operate as a piece of critical infrastructure. This research effort proposes a process to analyze critical infrastructure system availability requirements and a candidate set of systems architectures, producing a metric assessing these architectures over a spectrum of degradations to aid in selecting appropriate resilient architectures. To accomplish this effort, a set of simulation and evaluation efforts are undertaken that will process, in an automated way, a set of sample requirements into a set of potential architectures where system functions and capabilities are distributed across nodes. Nodes and links will have specific characteristics and based on sampled requirements, contribute to the overall system functionality, such that as they are impacted/degraded, the impacted functional availability of a system can be determined. A machine learning reinforcement-based agent will structurally impact the nodes, links, and characteristics (e.g., bandwidth, latency) of a given architecture to provide an assessment of system functional uptime/availability under these scenarios. By varying the intensity of the attack and related aspects, we can create a structured method of evaluating the performance of candidate architectures against each other to create a metric rating its resilience to these attack types/strategies. Through multiple simulation iterations, sufficient data will exist to compare this availability metric, and an architectural recommendation against the baseline requirements, in comparison to existing multi-factor computing architectural selection processes. It is intended that this additional data will create an improvement in the matching of resilient critical infrastructure system requirements to the correct architectures and implementations that will support improved operation during times of system degradation due to failures and infrastructure attacks.

Keywords: architecture, resiliency, availability, cyber-attack

Procedia PDF Downloads 71
299 The Challenge of Assessing Social AI Threats

Authors: Kitty Kioskli, Theofanis Fotis, Nineta Polemi

Abstract:

The European Union (EU) directive Artificial Intelligence (AI) Act in Article 9 requires that risk management of AI systems includes both technical and human oversight, while according to NIST_AI_RFM (Appendix C) and ENISA AI Framework recommendations, claim that further research is needed to understand the current limitations of social threats and human-AI interaction. AI threats within social contexts significantly affect the security and trustworthiness of the AI systems; they are interrelated and trigger technical threats as well. For example, lack of explainability (e.g. the complexity of models can be challenging for stakeholders to grasp) leads to misunderstandings, biases, and erroneous decisions. Which in turn impact the privacy, security, accountability of the AI systems. Based on the NIST four fundamental criteria for explainability it can also classify the explainability threats into four (4) sub-categories: a) Lack of supporting evidence: AI systems must provide supporting evidence or reasons for all their outputs. b) Lack of Understandability: Explanations offered by systems should be comprehensible to individual users. c) Lack of Accuracy: The provided explanation should accurately represent the system's process of generating outputs. d) Out of scope: The system should only function within its designated conditions or when it possesses sufficient confidence in its outputs. Biases may also stem from historical data reflecting undesired behaviors. When present in the data, biases can permeate the models trained on them, thereby influencing the security and trustworthiness of the of AI systems. Social related AI threats are recognized by various initiatives (e.g., EU Ethics Guidelines for Trustworthy AI), standards (e.g. ISO/IEC TR 24368:2022 on AI ethical concerns, ISO/IEC AWI 42105 on guidance for human oversight of AI systems) and EU legislation (e.g. the General Data Protection Regulation 2016/679, the NIS 2 Directive 2022/2555, the Directive on the Resilience of Critical Entities 2022/2557, the EU AI Act, the Cyber Resilience Act). Measuring social threats, estimating the risks to AI systems associated to these threats and mitigating them is a research challenge. In this paper it will present the efforts of two European Commission Projects (FAITH and THEMIS) from the HorizonEurope programme that analyse the social threats by building cyber-social exercises in order to study human behaviour, traits, cognitive ability, personality, attitudes, interests, and other socio-technical profile characteristics. The research in these projects also include the development of measurements and scales (psychometrics) for human-related vulnerabilities that can be used in estimating more realistically the vulnerability severity, enhancing the CVSS4.0 measurement.

Keywords: social threats, artificial Intelligence, mitigation, social experiment

Procedia PDF Downloads 29
298 A Survey in Techniques for Imbalanced Intrusion Detection System Datasets

Authors: Najmeh Abedzadeh, Matthew Jacobs

Abstract:

An intrusion detection system (IDS) is a software application that monitors malicious activities and generates alerts if any are detected. However, most network activities in IDS datasets are normal, and the relatively few numbers of attacks make the available data imbalanced. Consequently, cyber-attacks can hide inside a large number of normal activities, and machine learning algorithms have difficulty learning and classifying the data correctly. In this paper, a comprehensive literature review is conducted on different types of algorithms for both implementing the IDS and methods in correcting the imbalanced IDS dataset. The most famous algorithms are machine learning (ML), deep learning (DL), synthetic minority over-sampling technique (SMOTE), and reinforcement learning (RL). Most of the research use the CSE-CIC-IDS2017, CSE-CIC-IDS2018, and NSL-KDD datasets for evaluating their algorithms.

Keywords: IDS, imbalanced datasets, sampling algorithms, big data

Procedia PDF Downloads 280
297 Study of Germs Responsible of Nosocomial Infections in Hospital of Guelma

Authors: Wissem Abdaoui, Ilhem Mokhtari, Adel Gouri, Benouareth Djamel Eddine

Abstract:

Contracted in a health facility, hospital-acquired infections are a major public health problem in recent years. The increase of nosocomial infections is partly related to diagnostic and therapeutic advances in medicine. The aim of our study was to isolate and diagnose some types of bacteria that are circulating in the hospital by performing different samples at two medical services: Pulmonary and Infectious Diseases. The antibiotic susceptibility tests were performed for bacterial isolates. The results have shown that there is a predominance of enterobacteria followed by the staphylococcus with its two species epidermidis ans saprophyticus. The study of the antibiogramme identified that some of these bacteria have a resistant profile against all the tested antibiotics. The fight against nosocomial infections is difficult because it must act on several factors: quality of care, safety of the hospital environment, hygiene, wearing gloves etc. are all areas that should be of heightened vigilance and preventive measures.

Keywords: nosocomial infection, isolation, identification, sensitivity and resistance to antibiotics

Procedia PDF Downloads 351