Search results for: cybersecurity defense strategies
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5516

Search results for: cybersecurity defense strategies

5336 Context Aware Anomaly Behavior Analysis for Smart Home Systems

Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu

Abstract:

The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.

Keywords: Internet of Things, network security, context awareness, intrusion detection

Procedia PDF Downloads 150
5335 Exploring Strategies Used by Victims of Intimate Partner Violence to Increase Sense of Safety: A Systematic Review and Quantitative Study

Authors: Thomas Nally, Jane Ireland, Roxanne Khan, Philip Birch

Abstract:

Intimate Partner Violence (IPV), a significant societal problem, affects individuals worldwide. However, the strategies victims use to keep safe are under-researched. IPV is significantly under-reported, and services often are not able to be accessed by all victims. Thus they are likely to use their own strategies to manage their victimization before being able to seek support. Two studies were completed to understand these strategies. A systematic review of the literature and study completed with professionals who work with victims was undertaken to understand this area. In study one, a systematic review of the literature (n=61 papers), were analyzed using Thematic Analysis. The results indicated that victims use a large array of behaviors to increase their sense of safety and coping with emotions but also experience significant barriers to help-seeking. In study 2, sixty-nine professionals completed a measure exploring the likelihood and effectiveness of various victim strategies regarding increasing their sense of safety. Strategies included in the measure were obtained from those identified in study 1. Findings indicated that professionals perceived victims of IPV to be more likely to employ safety strategies and coping behaviors that may be ineffective but not help-seeking behaviors. Further, the responses were analyzed using Cluster Analysis. Safety strategies resulted in five clusters; perpetrator-directed strategies, prevention strategies, cognitive reappraisal, safety planning and avoidance strategies. Help-Seeking resulted in six clusters; information or practical support, abuse-related support, emotional support, secondary support and informal support. Finally, coping resulted in four clusters; emotional coping, self-directed coping, thought recording/change and cognitive coping. Both studies indicate that victims may use a variety of strategies to manage their safety besides seeking help. Professionals working with victims, using a strength-based approach, should understand what is used and is effective for victims who are unable to leave the relationships or access external support.

Keywords: intimate partner violence, help-seeking, professional support, victims, victim coping, victim safety

Procedia PDF Downloads 161
5334 Modeling and Stability Analysis of Viral Propagation in Wireless Mesh Networking

Authors: Haowei Chen, Kaiqi Xiong

Abstract:

This paper aims to answer how malware will propagate in Wireless Mesh Networks (WMNs) and how communication radius and distributed density of nodes affects the process of spreading. The above analysis is essential for devising network-wide strategies to counter malware. We answer these questions by developing an improved dynamical system that models malware propagation in the area where nodes were uniformly distributed. The proposed model captures both the spatial and temporal dynamics regarding the malware spreading process. Equilibrium and stability are also discussed based on the threshold of the system. If the threshold is less than one, the infected nodes disappear, and if the threshold is greater than one, the infected nodes asymptotically stabilize at the endemic equilibrium. Numerical simulations are investigated about communication radius and distributed density of nodes in WMNs, which allows us to draw various insights that can be used to guide security defense.

Keywords: Bluetooth security, malware propagation, wireless mesh networks, stability analysis

Procedia PDF Downloads 65
5333 India’s Deterrence Program: Defense or Development

Authors: Aneri Mehta, Krunal Mehta

Abstract:

A doctrine, any doctrine, incorporates a set of beliefs or principles held by a body of persons. A national nuclear doctrine represents, therefore, the collective set of beliefs or principles held by the nation in regard to the utility of its nuclear weapons. India’s foreign policy has been profoundly affected by the nuclear explosions conducted in May 1998. The departure from the professed peaceful nuclear policies has had several implications for India’s defense and foreign policies. The explosions in Pokhran have aggravated tensions in south Asia by disrupting diplomatic initiatives with Pak and China. Diplomacy has been reduced to damage control. The object of India’s nuclear deterrence is to persuade an adversary that the costs to him of seeking a military solution to his political problems with India will far outweigh the benefits. The paper focuses on India’s guidelines governing nuclear policy, development of nuclear materials for effective deterrence as well as civil development purpose. The paper finds that security concerns and technological capabilities are important determinants of whether India develops a nuclear weapons programs, while security concerns, economic capabilities, and domestic politics help to explain the possession of nuclear weapons.

Keywords: foreign policy, nuclear deterrence, nuclear policy, development

Procedia PDF Downloads 499
5332 Pragmatics of Illness: A View from Jordanian Arabic

Authors: Marwan Jarrah, Nadia Nugrush, Sukainah Ali, Areej Allawzi

Abstract:

This research article investigates how illnesses (different types and severity) are expressed in Arabic discourse with a particular focus on input coming from Colloquial Jordanian Arabic (CJA). Drawing on a corpus of naturally occurring conversations, this article offers evidence that illnesses are predominantly expressed through two different sets of expressive strategies, namely direct expressive strategies (DES) and indirect expressive strategies (IES). The latter are exclusively used when cancer and mental health disorders are targeted. IES include the substitution of the name of the illness with some religious expressions (e.g., ʔallah ʔijdʒi:rna ‘May Allah keeps us safe’) or certain terms especially when cancer is meant (e.g., haðˤa:k ʔil-maraðˤ ‘that disease’). On the other hand, DES are used in conjunction with other illnesses (e.g., heart, kidneys, diabetes, etc.), regardless of their severity. DES include specific formulas that remarkably mention the name of the inflicted organ (e.g., [with-SOMEONE the ORGAN] as in ʕinduh ʔil-qalb ‘lit. with-him the heart’ meaning ‘He has a heart disease). We discuss the effects of religious beliefs and local norms and values in determining the use of these strategies.

Keywords: Illnesses, pragmatics, expressive strategies, religion

Procedia PDF Downloads 50
5331 Pain Management Strategies for Effective Coping with Sickle Cell Disease: The Perspective of Patients in Ghana

Authors: V. A. Adzika, D. Ayim-Aboagye, T. Gordh

Abstract:

Background and aims: Prevalence of Sickle Cell Disease (SCD) is high in Ghana but not much is known in terms of research into non-medical strategies for managing and coping with the pain associated with SCD. This study was carried out to examine effective non-medical related strategies patients use to cope and manage their SCD condition. Methods: SCD patients (387) consisting of 180 males and 204 females between 18-65 years old years participated in the study. A cross-sectional research design was used in which participants completed questionnaires on pain, non-medical coping and management strategies, anxiety, and depression. Results of multiple regression analysis showed that socio-demographic characteristics contributed to the variance in the pain associated with SCD. Results: Over 90% of participants reported that pains associated with SCD were the main reason for seeking treatment in SCD crisis. In terms of non-medical related coping strategies, attending a place of worship and praying were the main coping strategies used in SCD crises, suggesting that patients’ beliefs, particularly in a supernatural being, served as a mitigating factor in the process of coping with the pain associated with SCD crisis. Also, avoidance and withdrawal from people and social activities were reported to be strategies used to cope effectively with the pain associated with SCD crisis. Conclusion: This indicates that it is imperative to incorporate non-medical related coping and management strategies, especially religious beliefs and psychosocial factors, to coping and management of the pain associated with SCD.

Keywords: anxiety, depression, sickle cell disease, quality of life, socio-demographic characteristics, Ghana

Procedia PDF Downloads 384
5330 Comparative Study of Medical and Fine Art Students on the Level of Perceived Stress and Coping Skills

Authors: Bushra Mussawar, Saleha Younus

Abstract:

Students often view their academic life demanding and stressful. However, apart from academics, stress springs from various other sources namely, finance, family, health, friends etc. The present study aims to assess the level of perceived stress in medical and fine arts students, and to determine the coping strategies used by the students to mitigate stress. The sample of the study consisted of 178 medical and fine arts students. The sample was selected through purposive sampling. Pearson correlation coefficient and T-test were used to analyze data. Results of the study revealed that there exists a positive relationship between perceived stress and coping strategies. Additionally, the two groups showed marked differences in terms of stress perception and coping styles. The level of perceived stress was found to be high in medical students nonetheless, they employed more positive coping strategies than fine arts students who scored high on negative coping strategies which are deleterious to the overall wellbeing.

Keywords: perceived stress, coping strategies, medical, fine arts students

Procedia PDF Downloads 261
5329 The AI Arena: A Framework for Distributed Multi-Agent Reinforcement Learning

Authors: Edward W. Staley, Corban G. Rivera, Ashley J. Llorens

Abstract:

Advances in reinforcement learning (RL) have resulted in recent breakthroughs in the application of artificial intelligence (AI) across many different domains. An emerging landscape of development environments is making powerful RL techniques more accessible for a growing community of researchers. However, most existing frameworks do not directly address the problem of learning in complex operating environments, such as dense urban settings or defense-related scenarios, that incorporate distributed, heterogeneous teams of agents. To help enable AI research for this important class of applications, we introduce the AI Arena: a scalable framework with flexible abstractions for distributed multi-agent reinforcement learning. The AI Arena extends the OpenAI Gym interface to allow greater flexibility in learning control policies across multiple agents with heterogeneous learning strategies and localized views of the environment. To illustrate the utility of our framework, we present experimental results that demonstrate performance gains due to a distributed multi-agent learning approach over commonly-used RL techniques in several different learning environments.

Keywords: reinforcement learning, multi-agent, deep learning, artificial intelligence

Procedia PDF Downloads 133
5328 Analysis of Poverty Reduction Strategies as Mechanism for Development in Nigeria from 1999 to 2014

Authors: Ahmed Usman Egye, Hamza Muhammad

Abstract:

Poverty alleviation is one of the most difficult challenges facing third world countries in their development efforts. Evidences in Nigeria showed that the number of those in poverty has continued to increase. This paper is aimed at analyzing the performance of poverty alleviation measures undertaken by successive administrations in Nigeria with a view to addressing the quagmire. The study identified the whole gamut of factors that served as stumbling blocks to the implementation of each of the strategies and recommended the involvement of local people in the identification and design of projects so that sufficient participation could be achieved.

Keywords: poverty, development, strategies, Nigeria

Procedia PDF Downloads 396
5327 Artificial Intelligence in Penetration Testing of a Connected and Autonomous Vehicle Network

Authors: Phillip Garrad, Saritha Unnikrishnan

Abstract:

The recent popularity of connected and autonomous vehicles (CAV) corresponds with an increase in the risk of cyber-attacks. These cyber-attacks have been instigated by both researchers or white-coat hackers and cyber-criminals. As Connected Vehicles move towards full autonomy, the impact of these cyber-attacks also grows. The current research details challenges faced in cybersecurity testing of CAV, including access and cost of the representative test setup. Other challenges faced are lack of experts in the field. Possible solutions to how these challenges can be overcome are reviewed and discussed. From these findings, a software simulated CAV network is established as a cost-effective representative testbed. Penetration tests are then performed on this simulation, demonstrating a cyber-attack in CAV. Studies have shown Artificial Intelligence (AI) to improve runtime, increase efficiency and comprehensively cover all the typical test aspects in penetration testing in other industries. There is an attempt to introduce similar AI models to the software simulation. The expectation from this implementation is to see similar improvements in runtime and efficiency for the CAV model. If proven to be an effective means of penetration test for CAV, this methodology may be used on a full CAV test network.

Keywords: cybersecurity, connected vehicles, software simulation, artificial intelligence, penetration testing

Procedia PDF Downloads 81
5326 Goal Orientation, Learning Strategies and Academic Performance in Adult Distance Learning

Authors: Ying Zhou, Jian-Hua Wang

Abstract:

Based upon the self-determination theory and self-regulated learning theory, this study examined the predictiveness of goal orientation and self-regulated learning strategies on academic achievement of adult students in distance learning. The results show a positive relation between goal orientation and the use of self-regulated strategies, and academic achievements. A significant and positive indirect relation of mastery goal orientation through self-regulated learning strategies was also found. In addition, results pointed to a positive indirect impact of performance-approach goal orientation on academic achievement. The effort regulation strategy fully mediated this relation. The theoretical and instructional implications are discussed. Interventions can be made to motivate students’ mastery or performance approach goal orientation and help them manage their time or efforts.

Keywords: goal orientation, self-regulated strategies, achievement, adult distance students

Procedia PDF Downloads 247
5325 Enhancing Coping Strategies of Student: A Case Study of 'Choice Theory' Group Counseling

Authors: Warakorn Supwirapakorn

Abstract:

The purpose of this research was to study the effects of choice theory in group counseling on coping strategies of students. The sample consisted of 16 students at a boarding school, who had the lowest score on the coping strategies. The sample was divided into two groups by random assignment and then were assigned into the experimental group and the control group, with eight members each. The instruments were the Adolescent Coping Scale and choice theory group counseling program. The data collection procedure was divided into three phases: The pre-test, the post-test, and the follow-up. The data were analyzed by repeated measure analysis of variance: One between-subjects and one within-subjects. The results revealed that the interaction between the methods and the duration of the experiment was found statistically significant at 0.05 level. The students in the experimental group demonstrated significantly higher at 0.05 level on coping strategies score in both the post-test and the follow-up than in the pre-test and the control group. No significant difference was found on coping strategies during the post-test phase and the follow-up phase of the experimental group.

Keywords: coping strategies, choice theory, group counseling, boarding school

Procedia PDF Downloads 180
5324 Science School Was Burned: A Case Study of Crisis Management in Thailand

Authors: Proud Arunrangsiwed

Abstract:

This study analyzes the crisis management and image repair strategies during the crisis of Mahidol Wittayanusorn School (MWIT) library burning. The library of this school was burned by a 16-year-old-male student on June 6th, 2010. This student blamed the school that the lesson was difficult, and other students were selfish. Although no one was in the building during the fire, it had caused damage to the building, books and electronic supplies around 130 million bahts (4.4 million USD). This event aroused many discourses arguing about the education system and morality. The strategies which were used during crisis were denial, shift the blame, bolstering, minimization, and uncertainty reduction. The results of using these strategies appeared after the crisis. That was the numbers of new students, who registered for the examination to get into this school in the later years, have remained the same.

Keywords: school, crisis management, violence, image repair strategies, uncertainty, burn

Procedia PDF Downloads 446
5323 The Relationship between Procurement Strategies and Sustainability Outcomes: A Systematic Literature Review

Authors: Cathy T. Mpanga Kowet, Aghaegbuna Obinna U. Ozumba

Abstract:

This study examined and identified the inconsistencies, relationships, gaps and recurring themes in literature regarding the relationship between procurement strategies employed in the construction projects for sustainable buildings and realization of sustainability goals. A systematic literature review of studies on the relationship between various procurement strategies and attainment of sustainability outcomes was conducted. Using specific terms, papers published between 2002 and 2018 were identified and screened according to an inclusion and exclusion criteria. Current findings reveal that, although the attainment of sustainability goals is achievable with both traditional and contemporary procurement strategies, only projects delivered using modern procurement strategies are capable of meeting and exceeding targeted sustainability objectives. However, traditional procurement strategy remains the preferred method for most green building construction projects. The results suggest implications for decision makers in considering the impact of selected procurement strategies on targeted sustainability goals, in the early stages of sustainable building construction projects. The study shows that there is a gap between the reported appropriate procurement strategies and what is being practiced currently. Theoretically, the study expands on the literature on adoption and diffusion of contemporary procurement strategies, by consolidating existing studies to highlight the current gaps. While the study is at the literature review stage, deductions will serve as basis for field work involving empirical data.

Keywords: green buildings construction, procurement method, procurement strategy, sustainability objectives, sustainability outcomes

Procedia PDF Downloads 135
5322 Money Laundering and Financing of Terrorism

Authors: Covadonga Mallada Fernández

Abstract:

Economic development and globalization of international markets have created a favourable atmosphere for the emergence of new forms of crime such as money laundering or financing of terrorism, which may contribute to destabilized and damage economic systems. In particular, money laundering have acquired great importance since the 11S attacks, what has caused on the one hand, the establishment and development of preventive measures and, on the other hand, a progressive hardening of penal measures. Since then, the regulations imposed to fight against money laundering have been viewed as key components also in the fight against terrorist financing. Terrorism, at the beginning, was a “national” crime connected with internal problems of the State (for instance the RAF in Germany or ETA in Spain) but in the last 20 years has started to be an international problem that is connected with the defence and security of the States. Therefore, the new strategic concept for the defense and security of NATO has a comprehensive list of security threats to the Alliance, such as terrorism, international instability, money laundering or attacks on cyberspace, among others. With this new concept, money laundering and terrorism has become a priority in the national defense. In this work we will analyze the methods to combat these new threats to the national security. We will study the preventive legislations to combat money laundering and financing of terrorism, the UIF that exchange information between States, and the hawala-Banking.

Keywords: control of financial flows, money laundering, terrorism, financing of terrorism

Procedia PDF Downloads 418
5321 The Risk of In-work Poverty and Family Coping Strategies

Authors: A. Banovcinova, M. Zakova

Abstract:

Labor market activity and paid employment should be a key factor in protecting individuals and families from falling into poverty and providing them with sufficient resources to meet the needs of their members. However, due to various processes in the labor market as well as the influence of individual factors and often insufficient social capital, there is a relatively large group of households that cannot eliminate paid employment and find themselves in a state of so-called working poverty. The aim of the research was to find out what strategies families use in managing poverty and meeting their needs and which of these strategies prevail in the Slovak population. A quantitative research strategy was chosen. The method of data collection was a structured interview focused on finding out the use of individual management strategies and also selected demographic indicators. The research sample consisted of members of families in which at least one member has a paid job. The condition for inclusion in the research was that the family's income did not exceed 60% of the national median equalized disposable income. The analysis of the results showed 5 basic areas to which management strategies are related - work, financial security, needs, social contacts and perception of the current situation. The prevailing strategies were strategies aimed at increasing and streamlining labor market activity and the planned and effective management of the family budget. Strategies that were rejected were mainly related to debt creation. The results make it possible to identify the preferred ways of managing poverty in individual areas of life, as well as the factors that influence this behavior. This information is important for working with families living in a state of working poverty and can help professionals develop positive ways of coping for families.

Keywords: copying strategies, family, in-work poverty, quantitative research

Procedia PDF Downloads 97
5320 Defence Industry in the Political Economy of State and Business Relations

Authors: Hatice Idil Gorgen

Abstract:

Turkey has been investing in its national defence industrial base since the 1980s. State’s role in defence industry showed differences in Turkey. Parallel with this, ruling group’s attitude toward companies in defence sector varied. These changes in policies and behaviors of the state have occurred throughout such milestones as political and economic turmoil in domestic and international level. Hence, it is argued that state’s role, relations with private companies in defense sector and its policies towards the defense industry has shown differences due to the international system, political institutions, ideas and political coalitions in Turkey since the 1980s. Therefore, in order to see changes in the role of the state in defence sector, this paper aims to indicate first, history of state’s role in production and defence industry in the post-1980s era. Secondly, to comprehend the changes in the state’s role in defence industry, Stephan Haggard’s sources of policy change will be provided in the theoretical ground. Thirdly, state cooperated, and joint venture defence firms, state’s actions toward them will be observed. The remaining part will explore the underlying reasons for the changes in the role of the state in defence industry, and it implicitly or explicitly impacts on state business relations. Major findings illustrate that targeted idea of self-sufficient or autarky Turkey to attract domestic audience and to raise the prestige through defence system; ruling elites can regard defence industry and involved business groups as a mean for their ends. State dominant value, sensitive perception which has been ever since Ottoman Empire, prioritizes business groups in defence industry compared to others and push the ruling elites to pursue hard power in defence sectors. Through the globally structural transformation in defence industry, integration of Turkey to liberal bloc deepened and widened interdependence among states. Although it is a qualitative study, it involves the numerated data and descriptive statistics. Data will be collected by searching secondary sources from the literature, examining official documents of ministry of defence, and other appropriate ministries.

Keywords: defense industry, state and business relations, public private relations, arm industry

Procedia PDF Downloads 285
5319 Manifestation of Behavioral and Emotional Disturbances and Perceived Coping Strategies of Earthquake Survived Children

Authors: Mahwish Rabia, Najma Najam

Abstract:

The present study was conducted to identify emotional and behavioral disturbances among earthquake survived children and the perceived coping strategies of affected children. In the present study, a sample of 50 children (6-16 years) belonging to badly affected areas (earthquake) was selected from different camps in Islamabad. Child Behavioral Checklist (CBCL) and Rotter Incomplete Sentence Blank (RISB) interpretations were used to assess variety of emotional and behavioral patterns, and Child Coping Strategies Checklist (CCSC) was used to assess the perceived coping strategies of affected children. Results showed that some of the frequent emotional/behavioral reactions exhibited by children like withdrawal, anxiety\depression, aggression and attention seeking behavior. Whereas gender-based comparisons indicated that female children showed more internalizing behavioral patterns (withdrawn, somatic complaints) as compared to male children who exhibited more externalizing emotions (aggression, delinquent behavior).Coping strategies in which male children tried to adopt Positive Cognitive Restructuring and for distracting attention they used distraction strategies of coping. It is concluded that significant negative emotional and behavioral reactions are exhibited by the earthquake affected children. Male children adopt coping strategies more as compared to female children. The study identifies the negative emotional and behavioral reactions towards trauma, which can be helpful for identifying the problematic area for counseling and therapeutic interventions for these children.

Keywords: behavioural disturbances, emotional disturbances, coping strategies, earthquake, children

Procedia PDF Downloads 454
5318 Enzymatic Activities of Two Iranian Wheat Cultivars Infected with Fusarium Culmorum

Authors: Parastoo Motallebi, Vahid Niknam, Hassan Ebrahimzadeh, Majid Hashemi

Abstract:

Wheat, the most strategically important worldwide crop, is widely grown in various countries. Based on international wheat production statistics (FAOSTAT database), the total production of wheat in 2012 was 13.8 in Iran. Fusarium culmorum is one of the principal causative agents of Fusarium crown rot (FCR), an overwhelming disease of wheat and barley which is in the early stages causing yield losses, stand reductions and rotting of root and lower stem tissues. In this study inoculation of two wheat seedlings of the susceptible cultivar Falat and the partially field-resistant cultivar Pishtaz were carried out in greenhouse conditions and root samples were taken for 6 days. The activity of peroxidase (POX) and polyphenoloxidase (PPO) enzymes were analyzed to identify possible relations between resistance and enzymatic activities. Although the POX and PPO activities in both geno types increased, this significant increase was more dominant in Pishtaz. The results showed an earlier elevation in the activity of these defense related enzymes in semi-resistant cv. Pishtaz after inoculation, suggested that the activities of POX and PPO in wheat geno types play an important role in the induction of resistance to this disease.

Keywords: Defense responses, Fusarium culmorum, Wheat

Procedia PDF Downloads 509
5317 Student Performance and Confidence Analysis on Education Virtual Environments through Different Assessment Strategies

Authors: Rubén Manrique, Delio Balcázar, José Parrado, Sebastián Rodríguez

Abstract:

Hand in hand with the evolution of technology, education systems have moved to virtual environments to provide increased coverage and facilitate the access to education. However, measuring student performance in virtual environments presents significant challenges to ensure students are acquiring the expected skills. In this study, the confidence and performance of engineering students in virtual environments is analyzed through different evaluation strategies. The effect of the assessment strategy in student confidence is identified using educational data mining techniques. Four assessment strategies were used. First, a conventional multiple choice test; second, a multiple choice test with feedback; third, a multiple choice test with a second chance; and fourth; a multiple choice test with feedback and second chance. Our results show that applying testing with online feedback strategies can influence positively student confidence.

Keywords: assessment strategies, educational data mining, student performance, student confidence

Procedia PDF Downloads 323
5316 Design of an Ensemble Learning Behavior Anomaly Detection Framework

Authors: Abdoulaye Diop, Nahid Emad, Thierry Winter, Mohamed Hilia

Abstract:

Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy.

Keywords: cybersecurity, data protection, access control, insider threat, user behavior analysis, ensemble learning, high performance computing

Procedia PDF Downloads 100
5315 The Application of Maintenance Strategy in Energy Power Plant: A Case Study

Authors: Steven Vusmuzi Mashego, Opeyeolu Timothy Laseinde

Abstract:

This paper presents a case study on applying maintenance strategies observed in a turbo-generator at a coal power plant. Turbo generators are one of the primary and critical components in energy generation. It is essential to apply correct maintenance strategies and apply operational procedures accordingly. The maintenance strategies are implemented to ensure the high reliability of the equipment. The study was carried out at a coal power station which will transit to a cleaner energy source in the nearest future. The study is relevant as lessons learned in this system will support plans and operational models implemented when cleaner energy sources replace coal-powered turbines. This paper first outlines different maintenance strategies executed on the turbo-generator modules. Secondly, the impacts of human factors on a coal power station are discussed, and the findings prompted recommendations for future actions.

Keywords: maintenance strategies, turbo generator, operational error, human factor, electricity generation

Procedia PDF Downloads 83
5314 The Impact of Teaching Critical Reading Strategies on Students' Performance in English and Communication Skills in College of Education, Azare, Bauchi State Nigeria

Authors: Musa Galadima Toro

Abstract:

The study focused on the impact of teaching critical reading strategies on students’ performance in English and communication skills at the college of education Azare Bauchi state, Nigeria. It adopted a pre-test, post-test experimental group design. A sample of two hundred and forty (240) students was randomly selected from four departments within the school. The students were randomized into two groups: experimental and control groups. The experimental group was taught critical reading strategies as a form of treatment, while the control group involved in normal reading comprehension exercises. The findings of the study showed a significant difference in the performance of students who were taught critical reading strategies at the post- test level. Recommendations based on the findings of the study were proffered such as placing more emphasis on teaching critical reading strategies in order to improve students’ creative thinking skills and also encouraging students to read articles in science and humanities to improve their reading skills among others.

Keywords: English, communication skill, critical reading, strategies

Procedia PDF Downloads 246
5313 Using the Structural Equation Model to Explain the Effect of Supervisory Practices on Regulatory Density

Authors: Jill Round

Abstract:

In the economic system, the financial sector plays a crucial role as an intermediary between market participants, other financial institutions, and customers. Financial institutions such as banks have to make decisions to satisfy the demands of all the participants by keeping abreast of regulatory change. In recent years, progress has been made regarding frameworks, development of rules, standards, and processes to manage risks in the banking sector. The increasing focus of regulators and policymakers placed on risk management, corporate governance, and the organization’s culture is of special interest as it requires a well-resourced risk controlling function, compliance function, and internal audit function. In the past years, the relevance of these functions that make up the so-called Three Lines of Defense has moved from the backroom to the boardroom. The approach of the model can vary based on the various organizational characteristics. Due to the intense regulatory requirements, organizations operating in the financial sector have more mature models. In less regulated industries there is more cloudiness about what tasks are allocated where. All parties strive to achieve their objectives through the effective management of risks and serve the identical stakeholders. Today, the Three Lines of Defense model is used throughout the world. The research looks at trends and emerging issues in the professions of the Three Lines of Defense within the banking sector. The answers are believed to helping to explain the increasing regulatory requirements for the banking sector. While the number of supervisory practices increases the risk management requirements intensify and demand more regulatory compliance at the same time. The Structural Equation Modeling (SEM) is applied by making use of conducted surveys in the research field. It aims to describe (i) the theoretical model regarding the applicable linearity relationships, (ii) the causal relationship between multiple predictors (exogenous) and multiple dependent variables (endogenous), (iii) taking into consideration the unobservable variables and (iv) the measurement errors. The surveys conducted on the research field suggest that the observable variables are caused by various latent variables. The SEM consists of the 1) measurement model and the 2) structural model. There is a detectable correlation regarding the cause-effect relationship among the performed supervisory practices and the increasing scope of regulation. Supervisory practices reinforce the regulatory density. In the past, controls were placed after supervisory practices were conducted or incidents occurred. In further research, it is of interest to examine, whether risk management is proactive, reactive to incidents and supervisory practices or can be both at the same time.

Keywords: risk management, structural equation model, supervisory practice, three lines of defense

Procedia PDF Downloads 196
5312 Design and Implementation Guidance System of Guided Rocket RKX-200 Using Optimal Guidance Law

Authors: Amalia Sholihati, Bambang Riyanto Trilaksono

Abstract:

As an island nation, is a necessity for the Republic of Indonesia to have a capable military defense on land, sea or air that the development of military weapons such as rockets for air defense becomes very important. RKX rocket-200 is one of the guided missiles which are developed by consortium Indonesia and coordinated by LAPAN that serve to intercept the target. RKX-200 is designed to have the speed of Mach 0.5-0.9. RKX rocket-200 belongs to the category two-stage rocket that control is carried out on the second stage when the rocket has separated from the booster. The requirement for better performance to intercept missiles with higher maneuverability continues to push optimal guidance law development, which is derived from non-linear equations. This research focused on the design and implementation of a guidance system based OGL on the rocket RKX-200 while considering the limitation of rockets such as aerodynamic rocket and actuator. Guided missile control system has three main parts, namely, guidance system, navigation system and autopilot systems. As for other parts such as navigation systems and other supporting simulated on MATLAB based on the results of previous studies. In addition to using the MATLAB simulation also conducted testing with hardware-based ARM TWR-K60D100M conjunction with a navigation system and nonlinear models in MATLAB using Hardware-in-the-Loop Simulation (HILS).

Keywords: RKX-200, guidance system, optimal guidance law, Hils

Procedia PDF Downloads 226
5311 Effectiveness of Coping Strategies Adopted by the Small Holder Farmers for Poverty Alleviation in Niger State, Nigeria

Authors: Noimot A. Bakare, Rotimi S. Olaleye, Bolaji O. Adeniji

Abstract:

The study examined the effectiveness of selected coping strategies for poverty alleviation among smallholder farmers in Niger State, Nigeria. Data were collected with the aid of interview schedule. A multistage random sampling technique was used to select 225 respondents from 3 geographical zones in the State. Data were analyzed using descriptive and inferential statistics. The results showed that majority (83.1%) of the respondents were within the age of 21-50 years, mostly male (76.0%) and married (77.8%). The highest educational level attained was quranic education. Findings showed that coping strategies commonly adopted by the farmers were; use of food stuff (94.2%), money savings(76.6%), reduction in expenditure(74.2%) and food consumption (65.2%). Also, there was high awareness of primary healthcare and fadama development poverty alleviation programmes by Government and non-governmental organizations. Regression model indicated a significant and positive relationship between the educational level of farmers, farm size, contact with extension and effectiveness of poverty coping strategies. Pearson correlation coefficient shows a correlation between coping strategies adopted and their effectiveness(r = 0.599, P < 0.01). However, t- test shows a significant difference between coping strategies adopted by the male and female farmers (t= -2.63, P < 0.01). It is recommended that awareness on poverty alleviation programmes aimed at improving the productivity of farming activities should be intensified while farmers should be involved in the planning and implementation of these programmes.

Keywords: coping strategies, effectiveness, farmers, poverty alleviation.

Procedia PDF Downloads 331
5310 Strategies and Problems of Teachers in Using Mother Tongue-Based Multilingual Education

Authors: Ezayra Dubria, Leonora Yambao

Abstract:

Mother Tongue–Based Multilingual Education (MTB-MLE) is a salient part of the recent reform in the country’s Education system which is the implementation of the K to 12 Basic Education Program. Its importance is highlighted by the passing of Republic Act 10523, otherwise known as the ‘Enhanced Basic Education Act of 2013’. However, teachers, especially new teachers encounter problems in using mother tongue as medium of instruction. Fortunately, teachers are able to create strategies which address these problems. Specifically, this paper gathered the viewpoints of teachers in using mother tongue and analyzed the different problems and strategies used. The problems encountered by teachers are lack of instructional materials written in mother tongue, especially books, lack of vocabulary, lack of teacher training, and influences of social media to learners. The strategies which address these problems are translation of literary pieces and other instructional materials, vocabulary enrichment through the use of word-of-the-day and picture-word association, remedial class, storytelling, differentiated instruction, explicit teaching, individual and group activities, and utilization of multilingual teaching.

Keywords: mother tongue-based instruction, multilingualism, problems, strategies

Procedia PDF Downloads 252
5309 Strategies and Perceptions of Small Olive Oil Farmers of By-Product Valorization

Authors: Judit Manuel-i-Martin, Mechthild Donner, Ivana Radic, Yamna Erraach, Fatima Elhadad, Taoufik Yatribi, Feliu Lopez-i-Gelats

Abstract:

This paper investigates how small olive farmers and olive oil producers implement circular economy practices to manage olive related waste and how such strategies are perceived by the farmers themselves. While there is a lot of data and research about possible uses of olive oil by-products, the perceptions and related practices of olive oil farmers is a much less investigated domain. A total of 60 semi-structured interviews were conducted in one of the most relevant olive oil producing regions in the Iberian Peninsula -the region of Terres de Ponent (Catalonia – Spain) - to examine the different by-product valorization strategies the olive oil farms develop. We test the hypothesis that the strategies conducted depend on the nature and amount of resources available by the farm. The results obtained point that access to milling infrastructure is a determining factor. We also found that olive tree pruning biomass and olive pomace are the most common by-products valorized by farmers, the first one on-farm and the latter in mills. Results indicate that high value uses for olive oil by-products are rarely implemented by farmers. We conclude that olive farmers tend to perceive by-product valorization strategies as waste management practices rather than as additional sources of value for their farm.

Keywords: circular economy, discourses, Mediterranean region, olive oil by-products, farmers’ strategies, olive pomace

Procedia PDF Downloads 109
5308 Anti-Corruption in Adverse Contexts: A Strategic Approach

Authors: Mushtaq H. Khan, Antonio Andreoni, Pallavi Roy

Abstract:

Developing countries are characterized by political settlements where formal rules are generally weakly enforced and widely violated. Conventional anti-corruption strategies that focus on improving the general enforcement of a rule of law and raising the costs of corruption facing individual public officials have typically delivered poor results in these contexts. Our alternative approach is to identify anti-corruption strategies that have a high impact and that are feasible to implement in these contexts. Our alternative approach identifies anti-corruption strategies from the bottom up. This involves identifying the characteristics of the corruption constraining particular development outcomes. By drawing on theories of rents and rent seeking, and theories of political settlements, we can assess the developmental impact of particular anti-corruption strategies and the feasibility of implementing these strategies. We argue that feasible anti-corruption in these contexts cannot be solely based on conventional anti-corruption strategies. In societies that have widespread rule violations, high-impact anti-corruption is only likely to be feasible if the overall strategy succeeds in aligning the interests and capabilities of powerful organizations at the sectoral level to support the enforcement of particular sets of rules. We examine four related strategies for changing these incentives and capabilities of critical stakeholders at the local or sectoral level, and we argue that this can provide a framework for organizing research on the impact and feasibility of anti-corruption activities in different priority areas in particular countries.

Keywords: anti-corruption, development, political settlements analysis, rule of law

Procedia PDF Downloads 379
5307 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare

Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon

Abstract:

This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.

Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty

Procedia PDF Downloads 336