Search results for: cybersecurity maturity
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 413

Search results for: cybersecurity maturity

293 The Effects of Yield and Yield Components of Some Quality Increase Applications on Razakı Grape Variety

Authors: Şehri Çınar, Aydın Akın

Abstract:

This study was conducted Razakı grape variety (Vitis vinifera L.) and its vine which was aged 19 was grown on 5 BB rootstock in a vegetation period of 2014 in Afyon province in Turkey. In this research, it was investigated whether the applications of Control (C), 1/3 Cluster Tip Reduction (1/3 CTR), Shoot Tip Reduction (STR), 1/3 CTR + STR, Boric Acid (BA), 1/3 CTR + BA, STR + BA, 1/3 CTR + STR + BA on yield and yield components of Razakı grape variety. The results were obtained as the highest fresh grape yield (7.74 kg/vine) with C application, as the highest cluster weight (244.62 g) with STR application, as the highest 100 berry weight (504.08 g) with C application, as the highest maturity index (36.89) with BA application, as the highest must yield (695.00 ml) with BA and (695.00 ml) with 1/3 CTR + STR + BA applications, as the highest intensity of L* color (46.93) with STR and (46.10) with 1/3 CTR + STR + BA applications, as the highest intensity of a* color (-5.37) with 1/3 CTR + STR and (-5.01) with STR, as the highest intensity of b* color (12.59) with STR application. The shoot tip reduction to increase cluster weight and boric acid application to increase maturity index of Razakı grape variety can be recommended.

Keywords: razakı, 1/3 cluster tip reduction, shoot tip reduction, boric acid, yield and yield components

Procedia PDF Downloads 439
292 Power System Cyber Security Risk in the Era of Digital Transformation

Authors: Rafat Rob, Khaled Alotaibi, Dana Nour, Abdullah Albadrani, Abdulmohsen Mulhim

Abstract:

Power systems digitization solutions provides a comprehensive smart, cohesive, interconnected network, extensive connectivity between digital assets, physical power plants, and resources to form digital economies. However, digitization has exposed the classical air gapped power plants to the rapid spread of cyber threats and attacks in the process delaying and forcing many organizations to rethink their cyber security policies and standards before they can augment their operation the new advanced digital devices. Cyber Security requirements for power systems (and industry control systems therein) demand a new approach, unique methodology, and design process that is completely different to Cyber Security measures designed for the IT systems. In practice, Cyber Security strategy, as applied to power systems, tends to be closely aligned to those measures applied for IT system purposes. The differentiator for Cyber Security in terms of power systems are the physical assets and applications used, alongside the ever-growing rate of expansion within the industry controls sector (in comparison to the relatively saturated growth observed for corporate IT systems). These factors increase the magnitude of the cyber security risk within such systems. The introduction of smart devices and sensors along the grid initiate vulnerable entry points to the systems. Every installed Smart Meter is a target; the way these devices communicate with each other may instigate a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack. Attacking one sensor or meter has the potential to propagate itself throughout the power grid reaching the IT network, where it may manifest itself as a malware infiltration.

Keywords: supply chain, cybersecurity, maturity model, risk, smart grid

Procedia PDF Downloads 77
291 Internal Product Management: The Key to Achieving Digital Maturity and Business Agility for Manufacturing IT Organizations

Authors: Frederick Johnson

Abstract:

Product management has a long and well-established history within the consumer goods industry, despite being one of the most obscure aspects of brand management. Many global manufacturing organizations are now opting for external cloud-based Manufacturing Execution Systems (MES) to replace costly and outdated monolithic MES solutions. Other global manufacturing leaders are restructuring their organizations to support human-centered values, agile methodologies, and fluid operating principles. Still, industry-leading organizations struggle to apply the appropriate framework for managing evolving external MES solutions as internal "digital products." Product management complements these current trends in technology and philosophical thinking in the market. This paper discusses the central problems associated with adopting product management processes by analyzing its traditional theories and characteristics. Considering these ideas, the article then constructs a translated internal digital product management framework by combining new and existing approaches and principles. The report concludes by demonstrating the framework's capabilities and potential effectiveness in achieving digital maturity and business agility within a manufacturing environment.

Keywords: internal product management, digital transformation, manufacturing information technology, manufacturing execution systems

Procedia PDF Downloads 108
290 A Methodological Approach to Digital Engineering Adoption and Implementation for Organizations

Authors: Sadia H. Syeda, Zain H. Malik

Abstract:

As systems continue to become more complex and the interdependencies of processes and sub-systems continue to grow and transform, the need for a comprehensive method of tracking and linking the lifecycle of the systems in a digital form becomes ever more critical. Digital Engineering (DE) provides an approach to managing an authoritative data source that links, tracks, and updates system data as it evolves and grows throughout the system development lifecycle. DE enables the developing, tracking, and sharing system data, models, and other related artifacts in a digital environment accessible to all necessary stakeholders. The DE environment provides an integrated electronic repository that enables traceability between design, engineering, and sustainment artifacts. The DE activities' primary objective is to develop a set of integrated, coherent, and consistent system models for the program. It is envisioned to provide a collaborative information-sharing environment for various stakeholders, including operational users, acquisition personnel, engineering personnel, and logistics and sustainment personnel. Examining the processes that DE can support in the systems engineering life cycle (SELC) is a primary step in the DE adoption and implementation journey. Through an analysis of the U.S Department of Defense’s (DoD) Office of the Secretary of Defense (OSD’s) Digital Engineering Strategy and their implementation, examples of DE implementation by the industry and technical organizations, this paper will provide descriptions of the current DE processes and best practices of implementing DE across an enterprise. This will help identify the capabilities, environment, and infrastructure needed to develop a potential roadmap for implementing DE practices consistent with its business strategy. A capability maturity matrix will be provided to assess the organization’s DE maturity emphasizing how all the SELC elements interlink to form a cohesive ecosystem. If implemented, DE can increase efficiency and improve the systems engineering processes' quality and outcomes.

Keywords: digital engineering, digital environment, digital maturity model, single source of truth, systems engineering life-cycle

Procedia PDF Downloads 68
289 Sales-Based Dynamic Investment and Leverage Decisions: A Longitudinal Study

Authors: Rihab Belguith, Fathi Abid

Abstract:

The paper develops a system-based approach to investigate the dynamic adjustment of debt structure and investment policies of the Dow-Jones index. This approach enables the assessment of relations among sales, debt, and investment opportunities by considering the simultaneous effect of the market environmental change and future growth opportunities. We integrate the firm-specific sales variance to capture the industries' conditions in the model. Empirical results were obtained through a panel data set of firms with different sectors. The analysis support that environmental change does not affect equally the different industry since operating leverage differs among industries and so the sensitivity to sales variance. Including adjusted-specific variance, we find that there is no monotonic relation between leverage, sales, and investment. The firm may choose a low debt level in response to high sales variance but high leverage to attenuate the negative relation between sales variance and the current level of investment. We further find that while the overall effect of debt maturity on leverage is unaffected by the level of growth opportunities, the shorter the maturity of debt is, the smaller the direct effect of sales variance on investment.

Keywords: dynamic panel, investment, leverage decision, sales uncertainty

Procedia PDF Downloads 207
288 The Role of Business Process Management in Driving Digital Transformation: Insurance Company Case Study

Authors: Dalia Suša Vugec, Ana-Marija Stjepić, Darija Ivandić Vidović

Abstract:

Digital transformation is one of the latest trends on the global market. In order to maintain the competitive advantage and sustainability, increasing number of organizations are conducting digital transformation processes. Those organizations are changing their business processes and creating new business models with the help of digital technologies. In that sense, one should also observe the role of business process management (BPM) and its maturity in driving digital transformation. Therefore, the goal of this paper is to investigate the role of BPM in digital transformation process within one organization. Since experiences from practice show that organizations from financial sector could be observed as leaders in digital transformation, an insurance company has been selected to participate in the study. That company has been selected due to the high level of its BPM maturity and the fact that it has previously been through a digital transformation process. In order to fulfill the goals of the paper, several interviews, as well as questionnaires, have been conducted within the selected company. The results are presented in a form of a case study. Results indicate that digital transformation process within the observed company has been successful, with special focus on the development of digital strategy, BPM and change management. The role of BPM in the digital transformation of the observed company is further discussed in the paper.

Keywords: business process management, case study, Croatia, digital transformation, insurance company

Procedia PDF Downloads 162
287 Geochemical Characterization of Bou Dabbous Formation in Thrust Belt Zones, Northern Tunisia

Authors: M. Ben Jrad, A. Belhaj Mohamed, S. Riahi, I. Bouazizi, M. Saidi, M. Soussi

Abstract:

The generative potential, depositional environment, thermal maturity and oil seeps of the organic-rich Bou Dabbous Formation (Ypresian) from the thrust belt northwestern Tunisia, were determined by Rock Eval and molecular analyses. The paleo-tectonic units in the area show some similarities with equivalent facies in Mediterranean Sea and Sicilian. The Bou Dabbous Formation displays variable source rock characteristics through the various units Tellian and Numidian nappes Units. Organic matter contents and petroleum potentials are fair to high (reaching 1.95% and 6 kg of HC/t of rock respectively) marine type II kerogen. An increasing SE-NW maturity gradient is well documented in the study area. The Bou Dabbous organic-rich facies are marginally mature stage in the Tellian Unit (Kasseb domain), whilst they are mature-late mature stage within Nefza-Ain Allega tectonic windows. A long and north of Cap Serrat-Ghardimaou Master Fault these facies are overmature. Oil/Oil and Oil/source rock correlation, based on biomarker and carbon isotopic composition, shows a positive genetic correlation between the oil seeps and Bou Dabbous source rock.

Keywords: biomarkers, Bou Dabbous Formation, Northern Tunisia, source rock

Procedia PDF Downloads 459
286 Reproductive Behavior of the Red Sea Immigrant Lagocephalus sceleratus (Gmelin, 1789) from the Mediterranean Coast, Egypt

Authors: Mahmoud M. S. Farrag, Alaa A. K. Elhaweet, El-Sayed Kh. A. Akel, Mohsen A. Moustafa

Abstract:

The present work aimed to study the reproductive strategy of the common lessepsian puffer fish Lagocephalus sceleratus (Gmelin, 1879) from the Egyptian Mediterranean Waters. It is a famous migratory species plays an important role in the field of fisheries and ecology of aquatic ecosystem. The specimens were collected monthly from the landing centers along the Egyptian Mediterranean coast during 2012. Six maturity stages were recorded: (I) Thread like stage, (II) Immature stage (Virgin stage), (III) Maturing stage (Developing Virgin and recovering spent), (IV) Nearly ripe stage, (V) Fully ripe, (VI) Spawning stage, (VII) Spent stage. According to sex ratio, males exhibited higher number than females representing 52.44 % of the total fishes with sex ratio 1: 0.91. Fish length corresponding to 50% maturation was 38.5 cm for males and 41 cm for females. The corresponding ages (age at first maturity) are equal to 2.14 and 2.27 years for male and female respectively. The ova diameter ranged from 0.02mm to 0.85mm, the mature ova ranged from 0.16mm to 0.85mm and showed progressive increase from April towards September. Also, the presences of ova diameter in one peak of mature and ripe eggs in the ovaries were observed during spawning period. The relationship between gutted weight and absolute fecundity indicated that that fecundity increased as the fish grew in weight. The absolute fecundity ranged from 260288 to 2372931 for fish weight ranged from 698 to 3285 cm with an average of 1449522±720975. The relative fecundity ranged from 373 to 722 for fish weight ranged from 698 to 3285 cm with an average of 776±231. The spawning season of L. sceleratus was investigated from the data of gonado-somatic index and monthly distribution of maturity stages along the year as well as sequence of ova diameter for mature stages and exhibited a relatively prolong spawning season extending from April for both sexes and ends in August for male while ends in September for female. Fish releases its ripe ova in one batch during the spawning season. Histologically, the ovarian cycle of L. sceleratus was classified into six stages and the testicular cycle into five stages. Histological characters of gonads of L. sceleratus during the year of study had confirmed the previous results of distribution of maturity stages, gonado-somatic index and ova diameter, indicating this fish species has prolonged spawning season from April to September. This species is considered totally or uni spawner with synchronous group as it contained one to two developmental stages at the same gonad.

Keywords: Lagocephalus sceleratus, reproductive biology, oogenesis, histology

Procedia PDF Downloads 274
285 CyberSecurity Malaysia: Towards Becoming a National Certification Body for Information Security Management Systems Internal Auditors

Authors: M. S. Razana, Z. W. Shafiuddin

Abstract:

Internal auditing is one of the most important activities for organizations that implement information security management systems (ISMS). The purpose of internal audits is to ensure the ISMS implementation is in accordance to the ISO/IEC 27001 standard and the organization’s own requirements for its ISMS. Competent internal auditors are the main element that contributes to the effectiveness of internal auditing activities. To realize this need, CyberSecurity Malaysia is now in the process of becoming a certification body that certifies ISMS internal auditors. The certification scheme will assess the competence of internal auditors in generic knowledge and skills in management systems, and also in ISMS-specific knowledge and skills. The certification assessment is based on the ISO/IEC 19011 Guidelines for auditing management systems, ISO/IEC 27007 Guidelines for information security management systems auditing and ISO/IEC 27001 Information security management systems requirements. The certification scheme complies with the ISO/IEC 17024 General requirements for bodies operating certification systems of persons. Candidates who pass the exam will be certified as an ISMS Internal Auditor, whose competency will be evaluated every three years.

Keywords: ISMS internal audit, ISMS internal auditor, ISO/IEC 17024, competence, certification

Procedia PDF Downloads 211
284 Information Technology and Occupational Safety and Health

Authors: Muhammad Afiq Anaqi Bin Baharudin, Muhammad Izamuddin Bin Mohd Nasir, Syarifuddin Bin Sujuanda, Muhammad Syahmi Rusyaidi Bin Sham Suddin, Danish Hakimi Bin Kamaruzaman, Muhammad Haqimi Nazim Bin Hasmanizam, Mohammad Akmal Zakwan Bin Amran, Muhammad Alparizi Bin Latif

Abstract:

By improving efficiency and production, information technology (IT) has transformed working environments, but it has also created new threats to occupational safety and health (OSH). This study evaluates the literature that has already been written on the subject of IT and OSH, identifies major findings and discussion points, and highlights gaps in the material that call for additional research. The study's findings, which look at how IT affects OSH in a sizable multinational organization, are also presented in the report. According to the report, IT poses a number of OSH problems, such as ergonomic dangers, eye strain, dangers related to cybersecurity, and psychological hazards. The report suggests using tactics like providing comfortable workstations, encouraging a healthy balance between work and life, and putting strong cybersecurity safeguards in place to reduce these dangers. The implications of these findings for OSH and IT are discussed in the paper's conclusion, and it emphasizes the need for more study and action to address these dangers and promote healthy and secure working environments in the age of digitization.

Keywords: information technology, occupational safety and health (OSH), ergonomic, hazards, workplace.

Procedia PDF Downloads 78
283 The Disposable Identities; Enabling Trust-by-Design to Build Sustainable Data-Driven Value

Authors: Lorna Goulden, Kai M. Hermsen, Jari Isohanni, Mirko Ross, Jef Vanbockryck

Abstract:

This article introduces disposable identities, with reference use cases and explores possible technical approaches. The proposed approach, when fully developed as an open-source toolkit, enables developers of mobile or web apps to employ a self-sovereign identity and data privacy framework, in order to rebuild trust in digital services by providing greater transparency, decentralized control, and GDPR compliance. With a user interface for the management of self-sovereign identity, digital authorizations, and associated data-driven transactions, the advantage of Disposable Identities is that they may also contain verifiable data such as the owner’s photograph, official or even biometric identifiers for more proactive prevention of identity abuse. These Disposable Identities designed for decentralized privacy management can also be time, purpose and context-bound through a secure digital contract; with verification functionalities based on tamper-proof technology.

Keywords: dentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRdentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRI

Procedia PDF Downloads 192
282 Context Aware Anomaly Behavior Analysis for Smart Home Systems

Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu

Abstract:

The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.

Keywords: Internet of Things, network security, context awareness, intrusion detection

Procedia PDF Downloads 149
281 Artificial Intelligence in Penetration Testing of a Connected and Autonomous Vehicle Network

Authors: Phillip Garrad, Saritha Unnikrishnan

Abstract:

The recent popularity of connected and autonomous vehicles (CAV) corresponds with an increase in the risk of cyber-attacks. These cyber-attacks have been instigated by both researchers or white-coat hackers and cyber-criminals. As Connected Vehicles move towards full autonomy, the impact of these cyber-attacks also grows. The current research details challenges faced in cybersecurity testing of CAV, including access and cost of the representative test setup. Other challenges faced are lack of experts in the field. Possible solutions to how these challenges can be overcome are reviewed and discussed. From these findings, a software simulated CAV network is established as a cost-effective representative testbed. Penetration tests are then performed on this simulation, demonstrating a cyber-attack in CAV. Studies have shown Artificial Intelligence (AI) to improve runtime, increase efficiency and comprehensively cover all the typical test aspects in penetration testing in other industries. There is an attempt to introduce similar AI models to the software simulation. The expectation from this implementation is to see similar improvements in runtime and efficiency for the CAV model. If proven to be an effective means of penetration test for CAV, this methodology may be used on a full CAV test network.

Keywords: cybersecurity, connected vehicles, software simulation, artificial intelligence, penetration testing

Procedia PDF Downloads 78
280 Comparative Postnatal Growth and Development of Skin in Precocial, Intermediate and Altricial Rodents as an Ontogenetic Reference to Regeneration

Authors: John M. Kimani, Joseph K. N. Kuria, Stephen G. Kiama

Abstract:

The spiny mouse (Acomys species) is a precocial rodent that has emerged as an interesting mammal model for various organ regeneration studies due to its remarkable ability to restore all tissues in punched ear holes and injured skin. There is a scarcity of information regarding neonatal and postnatal skin development in precocial mammals in comparison to other close relatives in the altricial-precocial spectrum. The varying developmental degrees of neonates and how they relate to adults are the focus of this study. The study compares neonatal characteristics and postnatal skin development in Acomys Percival to its close relative Lophuromys zena (Lophuromys flavipunctatus group) in the Deomyinae subfamily to establish their neonatal maturity status and growth pattern. Breeding colonies of A. percivali, L. zena and Mus musculus were established. The off-springs postnatal stages of structural dorsal and auricular skin development were studied where manifesting external features established through gross examination were used to unravel histogenesis of skin in neonates and aged groups. Skin specimens from the different rodents showed striking differences between the neonatal and aged groups. Moreover, the skin structure also exhibited considerable inter-species differences at the same postnatal time points but followed similar development patterns to maturity. The integument of the newborn A. Percival was the most advanced in development compared to the in-between nidicolous semi-precocial young of L. zena with a rapid postnatal development pattern and the altricial M. musculus, where most maturation of the integumentary system occurred in a prolonged postnatal period. We then utilized a 4-mm ear punch assay to compare the ability to replace auricular tissue and the rate of pinnal hole closure. L. zena closed the pinnal hole at a faster rate compared A. percivali. Taken together, our findings support the conclusion that neonatal maturity status and developmental patterns are not directly related to regenerative ability. This study deepens the understanding of skin morphogenesis across developmental, regenerative and evolutionary levels in mammals.

Keywords: altricial, intermediate, precocial, skin development, regeneration

Procedia PDF Downloads 25
279 Applied Free Living Nematode as Bioindicator to Assess Environmental Impact of Dam Construction in Ba Lai Estuary, Vietnam

Authors: Ngo Xuan Quang, Tran Thanh Thai, Ann Vanreusel

Abstract:

The Ba Lai dam construction was created in 2000 in the Ba Lai estuarine river, Ben Tre province, Vietnam to prevent marine water infiltration, drainage and de-acidification, and to build a reservoir of freshwater for land reclamation in the Ba Lai tributary. However, this dam is considered as an environmental failure for the originally connected estuarine and river ecosystem, especially to bad effect to benthic fauna distribution. This research aims to study applying free living nematode communities’ distribution in disturbance of dam construction as bioindicator to detect environmental impact. Nematode samples were collected together measuring physical–chemical environmental parameters such as chlorophyll, CPE, coliform, nutrient, grain size, salinity, dissolved oxygen, turbidity, conductivity, temperature in three stations within three replicates. Results showed that free living nematode communities at the dam construction was significantly low densities, low diversity (Hurlbert’s index, Hill diversity indices) and very low maturity index in comparison with two remaining stations. Strong correlation of nematode feeding types and communities’ structure was found in relation with sediment grain size and nutrient enrichment such nitrite, nitrate, phosphate and pigment concentration. Moreover, greatly negative link between nematode maturity index with nutrient parameters can serve as warning organic pollution of the Ba Lai river due to dam construction.

Keywords: Ba Lai, dam impact, nematode, environment

Procedia PDF Downloads 324
278 Mackerel (Scomber Australasicus) Reproduction in Northeastern Taiwan

Authors: Sunarti Sinaga, Hsueh-Jung Lu, Jia-Rong Lin

Abstract:

Blue mackerel (Scomber australasicus) is a crucial target species for Taiwan coastal fisheries and has maintained its status as the highest-produced species. Timely measurement of spawning status is crucial for determining the correct management strategy for this species. The objective of this study was to determine size at maturity, fecundity, batch fecundity, and spawning frequency on the basis of samples collected from Nan-Fang-Ao fishing port in Yilan during the spawning season from 2017 to 2019. Histological sections indicated that the blue mackerel are multiple spawners. A higher percentage of female fish spawned at the peak of the gonadosomatic index. The 50% sizes at maturity were 32.02, 32.13, and 29.64 cm. Mean total fecundity (batch fecundity) was 165 (103), 229 (96), and 210 (68) oocytes per ovary-free weight (g) for 2017, 2018, and 2019, respectively; fecundity was determined through observation of postovulatory follicles (POFs). The spawning frequencies (spawning fraction) in 2017, 2018, and 2019 were 3–10 days (0.13), 4–14 days (0.08), and 4–12 days (0.08), respectively. The spawning frequencies determined through the 3 estimated methods, namely the sums of (a) hydrated and Day 0 POFs; (b) Day 1+ POFs, and (c) all data combined, were 1 spawning event per 8, 10, and 9 days, respectively. The reproduction of the blue mackerel was greater in 2017 than it was in 2018 or 2019, as indicated by the higher batch fecundity and shorter spawning seasons. Environmental factors should also be considered as a major factor influencing successful reproduction and the spawning season.

Keywords: scomber australasicus, spawning frequency, batch fecundity, fecundity

Procedia PDF Downloads 76
277 Growing Evaluation Process in Chamaedorea Linearis with Humus from Biosolids of the Wastewater Treatment Plant, Nueva Granada Military University Cajica

Authors: J. Gonzalez, P. Jimenez, C. Isaza

Abstract:

Palms have different characteristics that make them vulnerable; that is the case of the Chamaedorea linearis, with the presence of solitary stems of small diameter and medium leaves, culturally harvested, and in religious festivities used. Additionally, they present a weak apical meristem as the only emergency point, slow development and growth, and an affectation due to the high rate of deforestation in Colombia. Propagation of this species can improve the pressure on wild populations and help their survival in the environment. In this study was used in 177 plants biosolids humus from the Wastewater Treatment Plant (WWTP), located at the UMNG Campus Cajica (Cundinamarca, Colombia). The experiment used a control and two treatments with 10% and 20% of humus. During the process, the variables evaluated were number of leaves, percentage of chlorophyll, stem length, and estimated leaf area. The data set were taking during 14 weeks before the reproductive maturity, evidencing that the most representative development of the palms was in the treatment of 20%, plants in this treatment presented major number of leaves, larger stems, a high quantity of chlorophyll, and was a first treatment that present pinnate leaves them represent an important point in maturity process. The research gives an opportunity to improve times of growth in another species of palms and plants (Product result from INV ING 2986 UMNG).

Keywords: biosolids, humus, growth, palms, wastewater treatment plant, WWTP

Procedia PDF Downloads 95
276 Design of an Ensemble Learning Behavior Anomaly Detection Framework

Authors: Abdoulaye Diop, Nahid Emad, Thierry Winter, Mohamed Hilia

Abstract:

Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy.

Keywords: cybersecurity, data protection, access control, insider threat, user behavior analysis, ensemble learning, high performance computing

Procedia PDF Downloads 100
275 Facilitation of Digital Culture and Creativity through an Ideation Strategy: A Case Study with an Incumbent Automotive Manufacturer

Authors: K. Ö. Kartal, L. Maul, M. Hägele

Abstract:

With the development of new technologies come additional opportunities for the founding of companies and new markets to be created. The barriers to entry are lowered and technology makes old business models obsolete. Incumbent companies have to be adaptable to this quickly changing environment. They have to start the process of digital maturation and they have to be able to adapt quickly to new and drastic changes that might arise. One of the biggest barriers for organizations in order to do so is their culture. This paper shows the core elements of a corporate culture that supports the process of digital maturation in incumbent organizations. Furthermore, it is explored how ideation and innovation can be used in a strategy in order to facilitate these core elements of culture that promote digital maturity. Focus areas are identified for the design of ideation strategies, with the aim to make the facilitation and incitation process more effective, short to long term. Therefore, one in-depth case study is conducted with data collection from interviews, observation, document review and surveys. The findings indicate that digital maturity is connected to cultural shift and 11 relevant elements of digital culture are identified which have to be considered. Based on these 11 core elements, five focus areas that need to be regarded in the design of a strategy that uses ideation and innovation to facilitate the cultural shift are identified. These are: Focus topics, rewards and communication, structure and frequency, regions and new online formats.

Keywords: digital transformation, innovation management, ideation strategy, creativity culture, change

Procedia PDF Downloads 158
274 The Road Ahead: Merging Human Cyber Security Expertise with Generative AI

Authors: Brennan Lodge

Abstract:

Amidst a complex regulatory landscape, Retrieval Augmented Generation (RAG) emerges as a transformative tool for Governance Risk and Compliance (GRC) officers. This paper details the application of RAG in synthesizing Large Language Models (LLMs) with external knowledge bases, offering GRC professionals an advanced means to adapt to rapid changes in compliance requirements. While the development for standalone LLM’s (Large Language Models) is exciting, such models do have their downsides. LLM’s cannot easily expand or revise their memory, and they can’t straightforwardly provide insight into their predictions, and may produce “hallucinations.” Leveraging a pre-trained seq2seq transformer and a dense vector index of domain-specific data, this approach integrates real-time data retrieval into the generative process, enabling gap analysis and the dynamic generation of compliance and risk management content. We delve into the mechanics of RAG, focusing on its dual structure that pairs parametric knowledge contained within the transformer model with non-parametric data extracted from an updatable corpus. This hybrid model enhances decision-making through context-rich insights, drawing from the most current and relevant information, thereby enabling GRC officers to maintain a proactive compliance stance. Our methodology aligns with the latest advances in neural network fine-tuning, providing a granular, token-level application of retrieved information to inform and generate compliance narratives. By employing RAG, we exhibit a scalable solution that can adapt to novel regulatory challenges and cybersecurity threats, offering GRC officers a robust, predictive tool that augments their expertise. The granular application of RAG’s dual structure not only improves compliance and risk management protocols but also informs the development of compliance narratives with pinpoint accuracy. It underscores AI’s emerging role in strategic risk mitigation and proactive policy formation, positioning GRC officers to anticipate and navigate the complexities of regulatory evolution confidently.

Keywords: cybersecurity, gen AI, retrieval augmented generation, cybersecurity defense strategies

Procedia PDF Downloads 50
273 Nutritional Evaluation of Different Quercus Species in Temperate Regions of Himachal Pradesh

Authors: Ankush Verma, Rohit Bishist

Abstract:

The present investigation was carried out at different locations of Shimla and Kinnaur district and nutrient analysis was done in the laboratory of Department of Silviculture and Agroforestry, Dr. Y.S. Parmar University of Horticulture and Forestry, Nauni, Distt. Solan, Himachal Pradesh during 2019-2020 with the objectives to study the seasonal variation in the nutritive value of different Quercus species and to study the farmers’ preference rating of fodder tress species. From each location leaf samples were collected at 3 months interval from each Quercus spp. The findings of the present study revealed that the nutritional traits of leaves of different Quercus species varied among different seasons throughout the year. The dry matter (61.12 to 64.99%), ether extract (4.07 to 4.42%), crude fibre (34.38 to 37.85%), neutral detergent fibre (57.70 to 61.54%), acid detergent fibre (44.64 to 48.51%), total ash (3.57 to 3.91%), acid insoluble ash (44.64 to 48.51%) and calcium (1.31 to 1.53%) increased with the maturity in the leaves of different Quercus species. While, crude protein (9.10 to 10.61%), nitrogen free extract (44.73 to 47.41%), organic matter (96.09 to 96.43%), and phosphorus (0.16 to 0.31%) decreased with the advancing maturity in the leaves of different Quercus species. Maximum mean values for dry matter (65.05%), ether extract (4.45%), crude fibre (40.82%), neutral detergent fibre (61.48%), acid detergent fibre (48.44%), and organic matter (96.67%) among different Quercus species were recorded in Quercus ilex, while, Maximum mean values for crude protein (10.54%), nitrogen free extract (50.53%), total ash (4.05%), acid insoluble ash (0.59%), calcium (1.61%) and phosphorus (0.40%) were recorded in Quercus leucotrichophora.

Keywords: nutritional evaluation, fodder species, crude protein, carbohydrates

Procedia PDF Downloads 47
272 Depositional Environment and Source Potential of Devonian Source Rock, Ghadames Basin, Southern Tunisia

Authors: S. Mahmoudi, A. Belhaj Mohamed, M. Saidi, F. Rezgui

Abstract:

Depositional environment and source potential of the different organic rich levels of Devonian age (up to 990m thick) from the onshore EC-1 well (Southern Tunisia) were investigated using different geochemical techniques (Rock-Eval pyrolysis, GC-MS) of over than 130 cutting samples. The obtained results including Rock Eval Pyrolysis data and biomarker distribution (terpanes, steranes and aromatics) have been used to describe the depositional environment and to assess the thermal maturity of the Devonian organic matter. These results show that the Emsian deposits exhibit poor to fair TOC contents. The associated organic matter is composed of mixed kerogen (type II/III), as indicated by the predominance of C29 steranes over C27 and C28 homologous, that was deposited in a slightly reduced environment favoring organic matter preservation. Thermal maturity assessed from Tmax, TNR and MPI-1 values shows a mature stage of organic matter. The Middle Devonian (Eifelian) shales are rich in type II organic matter that was deposited in an open marine depositional environment. The TOC values are high and vary between 2 and 7 % indicating good to excellent source rock. The relatively high IH values (reaching 547 mg HC/g TOC) and the low values of t19/t23 ratio (down to 0.2) confirm the marine origin of the organic matter (type II). During the Upper Devonian, the organic matter was deposited under variable redox conditions, oxic to suboxic which is clearly indicated by the low C35/C34 hopanes ratio, immature to marginally mature with the vitrinite reflectance ranging from 0.5 to 0.7 Ro and Tmax value of 426°C-436 °C and the TOC values range between 0.8% to 4%.

Keywords: biomarker, depositional environment, devonian, source rock

Procedia PDF Downloads 447
271 Genetic Trait Analysis of RIL Barley Genotypes to Sort-out the Top Ranked Elites for Advanced Yield Breeding Across Multi Environments of Tigray, Ethiopia

Authors: Hailekiros Tadesse Tekle, Yemane Tsehaye, Fetien Abay

Abstract:

Barley (Hordeum vulgare L.) is one of the most important cereal crops in the world, grown for the poor farmers in Tigray with low yield production. The purpose of this research was to estimate the performance of 166 barley genotypes against the quantitative traits with detailed analysis of the variance component, heritability, genetic advance, and genetic usefulness parameters. The finding of ANOVA was highly significant variation (p ≤ 0:01) for all the genotypes. We found significant differences in coefficient of variance (CV of 15%) for 5 traits out of the 12 quantitative traits. The topmost broad sense heritability (H2) was recorded for seeds per spike (98.8%), followed by thousand seed weight (96.5%) with 79.16% and 56.25%, respectively, of GAM. The traits with H2 ≥ 60% and GA/GAM ≥ 20% suggested the least influenced by the environment, governed by the additive genes and direct selection for improvement of such beneficial traits for the studied genotypes. Hence, the 20 outstanding recombinant inbred lines (RIL) barley genotypes performing early maturity, high yield, and 1000 seed weight traits simultaneously were the top ranked group barley genotypes out of the 166 genotypes. These are; G5, G25, G33, G118, G36, G123, G28, G34, G14, G10, G3, G13, G11, G32, G8, G39, G23, G30, G37, and G26. They were early in maturity, high TSW and GYP (TSW ≥ 55 g, GYP ≥ 15.22 g/plant, and DTM below 106 days). In general, the 166 genotypes were classified as high (group 1), medium (group 2), and low yield production (group 3) genotypes in terms of yield and yield component trait analysis by clustering; and genotype parameter analysis such as the heritability, genetic advance, and genetic usefulness traits in this investigation.

Keywords: barley, clustering, genetic advance, heritability, usefulness, variability, yield

Procedia PDF Downloads 46
270 Effect of Pre Harvest Application of Amino Acids on Fruit Development of Sub-Tropical Peach

Authors: Manjot Kaur, Harminder Singh, S. K. Jawandha

Abstract:

The present investigations were carried out at Fruit Research Farm, Department of Fruit Science, Punjab Agricultural University, Ludhiana during the years 2016 and 2017, with the aim of assessing the effect of amino acids on fruit development, shoot growth and yield of peach. The six-year-old peach trees of cv. Florida Prince were sprayed with 0.25 % and 0.50 % concentrations of amino acids (Peptone P1 023), 7 and 14 days after full bloom and the sprays were repeated after 15 and 30 days. Experimental findings showed that all the amino acid treatments increased fruit growth, shoot growth, fruit retention and yield and decreased fruit drop as compared to control during both the years. Maximum fruit retention (89.29 %) and minimum fruit drop (10.71 %) was observed in T8 (2 sprays @ 0.50%). Highest mean shoot growth (113.89 cm) was recorded in T12 (3 sprays @ 0.50%) while the minimum was in control plants (88.23 cm). Fruit yield was also found to be maximum (53.92 kg/tree) under double spray treatment T8 (2 sprays @ 0.50%) of amino acids and minimum in plants sprayed with triple spray of amino acids. Fruit maturity was advanced by 3-4 days by double spray treatments of amino acids as compared to control. In brief, the application of double spray of amino acids @ 0.50% (applied 14 days after full bloom and 15 days later), was found to be best to improve the fruit growth, fruit retention and yield of Florida Prince peach under Punjab conditions.

Keywords: amino acids, fruit growth, maturity, peach, shoot growth

Procedia PDF Downloads 155
269 Technology and the Need for Integration in Public Education

Authors: Eric Morettin

Abstract:

Cybersecurity and digital literacy are pressing issues among Canadian citizens, yet formal education does not provide today’s students with the necessary knowledge and skills needed to adapt to these challenging issues within the physical and digital labor-market. Canada’s current education systems do not highlight the importance of these respective fields, aside from using technology for learning management systems and alternative methods of assignment completion. Educators are not properly trained to integrate technology into the compulsory courses within public education, to better prepare their learners in these topics and Canada’s digital economy. ICTC addresses these gaps in education and training through cross-Canadian educational programming in digital literacy and competency, cybersecurity and coding which is bridged with Canada’s provincially regulated K-12 curriculum guidelines. After analyzing Canada’s provincial education, it is apparent that there are gaps in learning related to technology, as well as inconsistent educational outcomes that do not adequately represent the current Canadian and global economies. Presently only New Brunswick, Nova Scotia, Ontario, and British Columbia offer curriculum guidelines for cybersecurity, computer programming, and digital literacy. The remaining provinces do not address these skills in their curriculum guidelines. Moreover, certain courses across some provinces not being updated since the 1990’s. The three territories respectfully take curriculum strands from other provinces and use them as their foundation in education. Yukon uses all British Columbia curriculum. Northwest Territories and Nunavut respectfully use a hybrid of Alberta and Saskatchewan curriculum as their foundation of learning. Education that is provincially regulated does not allow for consistency across the country’s educational outcomes and what Canada’s students will achieve – especially when curriculum outcomes have not been updated to reflect present day society. Through this, ICTC has aligned Canada’s provincially regulated curriculum and created opportunities for focused education in the realm of technology to better serve Canada’s present learners and teachers; while addressing inequalities and applicability within curriculum strands and outcomes across the country. As a result, lessons, units, and formal assessment strategies, have been created to benefit students and teachers in this interdisciplinary, cross-curricular, practice - as well as meeting their compulsory education requirements and developing skills and literacy in cyber education. Teachers can access these lessons and units through ICTC’s website, as well as receive professional development regarding the assessment and implementation of these offerings from ICTC’s education coordinators, whose combines experience exceeds 50 years of teaching in public, private, international, and Indigenous schools. We encourage you to take this opportunity that will benefit students and educators, and will bridge the learning and curriculum gaps in Canadian education to better reflect the ever-changing public, social, and career landscape that all citizens are a part of. Students are the future, and we at ICTC strive to ensure their futures are bright and prosperous.

Keywords: cybersecurity, education, curriculum, teachers

Procedia PDF Downloads 51
268 Stochastic Edge Based Anomaly Detection for Supervisory Control and Data Acquisitions Systems: Considering the Zambian Power Grid

Authors: Lukumba Phiri, Simon Tembo, Kumbuso Joshua Nyoni

Abstract:

In Zambia recent initiatives by various power operators like ZESCO, CEC, and consumers like the mines to upgrade power systems into smart grids target an even tighter integration with information technologies to enable the integration of renewable energy sources, local and bulk generation, and demand response. Thus, for the reliable operation of smart grids, its information infrastructure must be secure and reliable in the face of both failures and cyberattacks. Due to the nature of the systems, ICS/SCADA cybersecurity and governance face additional challenges compared to the corporate networks, and critical systems may be left exposed. There exist control frameworks internationally such as the NIST framework, however, there are generic and do not meet the domain-specific needs of the SCADA systems. Zambia is also lagging in cybersecurity awareness and adoption, therefore there is a concern about securing ICS controlling key infrastructure critical to the Zambian economy as there are few known facts about the true posture. In this paper, we introduce a stochastic Edged-based Anomaly Detection for SCADA systems (SEADS) framework for threat modeling and risk assessment. SEADS enables the calculation of steady-steady probabilities that are further applied to establish metrics like system availability, maintainability, and reliability.

Keywords: anomaly, availability, detection, edge, maintainability, reliability, stochastic

Procedia PDF Downloads 75
267 Modeling Palm Oil Quality During the Ripening Process of Fresh Fruits

Authors: Afshin Keshvadi, Johari Endan, Haniff Harun, Desa Ahmad, Farah Saleena

Abstract:

Experiments were conducted to develop a model for analyzing the ripening process of oil palm fresh fruits in relation to oil yield and oil quality of palm oil produced. This research was carried out on 8-year-old Tenera (Dura × Pisifera) palms planted in 2003 at the Malaysian Palm Oil Board Research Station. Fresh fruit bunches were harvested from designated palms during January till May of 2010. The bunches were divided into three regions (top, middle and bottom), and fruits from the outer and inner layers were randomly sampled for analysis at 8, 12, 16 and 20 weeks after anthesis to establish relationships between maturity and oil development in the mesocarp and kernel. Computations on data related to ripening time, oil content and oil quality were performed using several computer software programs (MSTAT-C, SAS and Microsoft Excel). Nine nonlinear mathematical models were utilized using MATLAB software to fit the data collected. The results showed mean mesocarp oil percent increased from 1.24 % at 8 weeks after anthesis to 29.6 % at 20 weeks after anthesis. Fruits from the top part of the bunch had the highest mesocarp oil content of 10.09 %. The lowest kernel oil percent of 0.03 % was recorded at 12 weeks after anthesis. Palmitic acid and oleic acid comprised of more than 73 % of total mesocarp fatty acids at 8 weeks after anthesis, and increased to more than 80 % at fruit maturity at 20 weeks. The Logistic model with the highest R2 and the lowest root mean square error was found to be the best fit model.

Keywords: oil palm, oil yield, ripening process, anthesis, fatty acids, modeling

Procedia PDF Downloads 281
266 EECS: Reimagining the Future of Technology Education through Electrical Engineering and Computer Science Integration

Authors: Yousef Sharrab, Dimah Al-Fraihat, Monther Tarawneh, Aysh Alhroob, Ala’ Khalifeh, Nabil Sarhan

Abstract:

This paper explores the evolution of Electrical Engineering (EE) and Computer Science (CS) education in higher learning, examining the feasibility of unifying them into Electrical Engineering and Computer Science (EECS) for the technology industry. It delves into the historical reasons for their separation and underscores the need for integration. Emerging technologies such as AI, Virtual Reality, IoT, Cloud Computing, and Cybersecurity demand an integrated EE and CS program to enhance students' understanding. The study evaluates curriculum integration models, drawing from prior research and case studies, demonstrating how integration can provide students with a comprehensive knowledge base for industry demands. Successful integration necessitates addressing administrative and pedagogical challenges. For academic institutions considering merging EE and CS programs, the paper offers guidance, advocating for a flexible curriculum encompassing foundational courses and specialized tracks in computer engineering, software engineering, bioinformatics, information systems, data science, AI, robotics, IoT, virtual reality, cybersecurity, and cloud computing. Elective courses are emphasized to keep pace with technological advancements. Implementing this integrated approach can prepare students for success in the technology industry, addressing the challenges of a technologically advanced society reliant on both EE and CS principles. Integrating EE and CS curricula is crucial for preparing students for the future.

Keywords: electrical engineering, computer science, EECS, curriculum integration of EE and CS

Procedia PDF Downloads 22
265 A Comparative Study between Japan and the European Union on Software Vulnerability Public Policies

Authors: Stefano Fantin

Abstract:

The present analysis outcomes from the research undertaken in the course of the European-funded project EUNITY, which targets the gaps in research and development on cybersecurity and privacy between Europe and Japan. Under these auspices, the research presents a study on the policy approach of Japan, the EU and a number of Member States of the Union with regard to the handling and discovery of software vulnerabilities, with the aim of identifying methodological differences and similarities. This research builds upon a functional comparative analysis of both public policies and legal instruments from the identified jurisdictions. The result of this analysis is based on semi-structured interviews with EUNITY partners, as well as by the participation of the researcher to a recent report from the Center for EU Policy Study on software vulnerability. The European Union presents a rather fragmented legal framework on software vulnerabilities. The presence of a number of different legislations at the EU level (including Network and Information Security Directive, Critical Infrastructure Directive, Directive on the Attacks at Information Systems and the Proposal for a Cybersecurity Act) with no clear focus on such a subject makes it difficult for both national governments and end-users (software owners, researchers and private citizens) to gain a clear understanding of the Union’s approach. Additionally, the current data protection reform package (general data protection regulation), seems to create legal uncertainty around security research. To date, at the member states level, a few efforts towards transparent practices have been made, namely by the Netherlands, France, and Latvia. This research will explain what policy approach such countries have taken. Japan has started implementing a coordinated vulnerability disclosure policy in 2004. To date, two amendments can be registered on the framework (2014 and 2017). The framework is furthermore complemented by a series of instruments allowing researchers to disclose responsibly any new discovery. However, the policy has started to lose its efficiency due to a significant increase in reports made to the authority in charge. To conclude, the research conducted reveals two asymmetric policy approaches, time-wise and content-wise. The analysis therein will, therefore, conclude with a series of policy recommendations based on the lessons learned from both regions, towards a common approach to the security of European and Japanese markets, industries and citizens.

Keywords: cybersecurity, vulnerability, European Union, Japan

Procedia PDF Downloads 116
264 Evaluation of Model-Based Code Generation for Embedded Systems–Mature Approach for Development in Evolution

Authors: Nikolay P. Brayanov, Anna V. Stoynova

Abstract:

Model-based development approach is gaining more support and acceptance. Its higher abstraction level brings simplification of systems’ description that allows domain experts to do their best without particular knowledge in programming. The different levels of simulation support the rapid prototyping, verifying and validating the product even before it exists physically. Nowadays model-based approach is beneficial for modelling of complex embedded systems as well as a generation of code for many different hardware platforms. Moreover, it is possible to be applied in safety-relevant industries like automotive, which brings extra automation of the expensive device certification process and especially in the software qualification. Using it, some companies report about cost savings and quality improvements, but there are others claiming no major changes or even about cost increases. This publication demonstrates the level of maturity and autonomy of model-based approach for code generation. It is based on a real live automotive seat heater (ASH) module, developed using The Mathworks, Inc. tools. The model, created with Simulink, Stateflow and Matlab is used for automatic generation of C code with Embedded Coder. To prove the maturity of the process, Code generation advisor is used for automatic configuration. All additional configuration parameters are set to auto, when applicable, leaving the generation process to function autonomously. As a result of the investigation, the publication compares the quality of generated embedded code and a manually developed one. The measurements show that generally, the code generated by automatic approach is not worse than the manual one. A deeper analysis of the technical parameters enumerates the disadvantages, part of them identified as topics for our future work.

Keywords: embedded code generation, embedded C code quality, embedded systems, model-based development

Procedia PDF Downloads 217