Search results for: cybersecurity protective behaviour
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2809

Search results for: cybersecurity protective behaviour

2749 Dealing the Disruptive Behaviour amongst Students with Autism through Circus

Authors: K. A. Razhiyah

Abstract:

Disruptive behavior is a problem that is usually associated with those with autism. There is a need to overcome this behavioral problem because the negative impact of this problem does not only effect the social relation of the students but also can cause uneasiness to those around them. This condition will be worse if the techniques used failed to motivate students to change the behaviour. The purpose of this study was to determine the effect of the circus games technique on the disruptive behavior amongst students with autism. The positive results of the intervention that was carried out for three months show the reduction in disruptive behaviour, and also improvement in the turn-taking and focusing ability aspect. Positive changes shown by the students had an encouraging effect and in a way are helping them in the teaching and learning process.

Keywords: autism, desruptive behaviour, circus, effect

Procedia PDF Downloads 216
2748 Stress and Personality as Predictors of Aggressive Behaviour among Nurses of Private Hospitals in Imo State, Nigeria

Authors: Ngozi N. Sydney-Agbor, Chioma N. Ihegboro

Abstract:

Stress and personality as factors influencing nurses’ aggressive behaviour were investigated. The participants comprised of one hundred and fifty nurses selected through convenience sampling technique from four (4) private hospitals in Imo State, Nigeria; namely: Eastern Summit Specialist Clinics and Maternity, St. David Hospital, New Cross Hospital, and Christian Teaching Hospital. The nurses were all females with ages between 20–35 and a mean age of 25.10 years and a standard deviation of 4.15. The participants were administered with Job Related Tension Scale, Type A Behaviour Scale and Buss- Perry Aggressive Behaviour Scale. Two hypotheses were postulated and tested. Cross- sectional survey and Regression Analysis were adopted as design and statistics respectively. Results showed that as stress increased, nurses aggression also increased. Personality also predicted nurses aggressive behaviour with Type As’ exhibiting higher aggression than Type Bs’.The study recommended that hospital management board should improve the welfare of the nurses and their morale should be boosted by involving them in policy-making concerning their welfare and care of their patients, this will help minimise situations capable of increasing aggressive behaviour. There should also be sensitization on the negative impact of aggressive behaviour to patients especially amongst the personality Type A’s who are more susceptible to aggression.

Keywords: aggressive behaviour, nurses, personality, stress

Procedia PDF Downloads 313
2747 Helping Others and Mental Health: A Qualitative Study Exploring Perspectives of Youth Engaging in Prosocial Activities

Authors: Saima Hirani, Emmanuela Ojukwu, Nilanga Aki Bandara

Abstract:

Background: Mental health challenges that begin during the youth age period may continue across the entire life course. One way to support youth mental health is to encourage youth engagement in prosocial activities. This study aimed to explore youth’s perceptions about helping others and mental well-being, barriers, and enablers for youth to initiate and continue prosocial activities, and strategies for developing the attribute of helping others in youth. Methods: We conducted a qualitative study using semi-structured, virtual interviews with 18 young individuals (aged 16-24 years) living in Vancouver, British Columbia, Canada. Results: Youth perceived helping others as a source of feeling peace and calm, finding meaning in life, experiencing social connection and promoting self-care, and relieving stress. Participants reported opportunities to learn new skills, the role of religion, social connections, previous positive experiences, and role modeling as enablers for their prosocial behaviour. Heavy time commitment, negative behaviour from others, self-doubt, and late exposure to such activities were considered barriers by youth when participating in prosocial activities. Youth also brought forward key recommendations for engaging youth in helping others. Conclusions: The findings of this study support the notion that youth have positive experiences when engaging in helping others and that involving young people in prosocial activities could be used as a protective intervention for promoting youth mental health and overall well-being.

Keywords: helping others, prosocial behaviour, youth, mental well-being

Procedia PDF Downloads 40
2746 Drivers of Energy Saving Behaviour: The Relative Influence of Normative, Habitual, Intentional, and Situational Processes

Authors: Karlijn Van Den Broek, Ian Walker, Christian Klöckner

Abstract:

Campaigns aiming to induce energy-saving behaviour among householders use a wide range of approaches that address many different drivers thought to underpin this behaviour. However, little research has compared the relative importance of the different factors that influence energy behaviour, meaning campaigns are not informed about where best to focus resources. Therefore, this study applies the Comprehensive Action Determination Model (CADM) to compare the role of normative, intentional, habitual, and situational processes on energy-saving behaviour. An online survey on a sample of households (N = 247) measured the CADM variables and the data was analysed using structural equation modelling. Results showed that situational and habitual processes were best able to account for energy saving behaviour while normative and intentional processes had little predictive power. These findings suggest that policymakers should move away from motivating householders to save energy and should instead focus their efforts on changing energy habits and creating environments that facilitate energy saving behaviour. These findings add to the wider development in social and environmental psychology that emphasizes the importance of extra-personal variables such as the physical environment in shaping behaviour.

Keywords: energy consumption, behavioural modelling, environmental psychology theory, habits, values

Procedia PDF Downloads 215
2745 Automatic Intelligent Analysis of Malware Behaviour

Authors: Hermann Dornhackl, Konstantin Kadletz, Robert Luh, Paul Tavolato

Abstract:

In this paper we describe the use of formal methods to model malware behaviour. The modelling of harmful behaviour rests upon syntactic structures that represent malicious procedures inside malware. The malicious activities are modelled by a formal grammar, where API calls’ components are the terminals and the set of API calls used in combination to achieve a goal are designated non-terminals. The combination of different non-terminals in various ways and tiers make up the attack vectors that are used by harmful software. Based on these syntactic structures a parser can be generated which takes execution traces as input for pattern recognition.

Keywords: malware behaviour, modelling, parsing, search, pattern matching

Procedia PDF Downloads 303
2744 Understanding Children’s Visual Attention to Personal Protective Equipment Using Eye-Tracking

Authors: Vanessa Cho, Janet Hsiao, Nigel King, Robert Anthonappa

Abstract:

Background: The personal protective equipment (PPE) requirements for health care workers (HCWs) have changed significantly during the COVID-19 pandemic. Aim: To ascertain, using eye-tracking technology, what children notice the most when seeing HCWs in various PPE. Design: A Tobii nano pro-eye-tracking camera tracked 156 children's visual attention while they viewed photographs of HCWs in various PPEs. Eye Movement analysis with Hidden Markov Models (EMHMM) was employed to analyse 624 recordings using two approaches, namely (i) data-driven where children's fixation determined the regions of interest (ROIs), and (ii) fixed ROIs where the investigators predefined the ROIs. Results: Two significant eye movement patterns, namely distributed(85.2%) and selective(14.7%), were identified(P<0.05). Most children fixated primarily on the face regardless of the different PPEs. Children fixated equally on all PPE images in the distributed pattern, while a strong preference for unmasked faces was evident in the selective pattern (P<0.01). Conclusion: Children as young as 2.5 years used a top-down visual search behaviour and demonstrated their face processing ability. Most children did not show a strong visual preference for a specific PPE, while a minority preferred PPE with distinct facial features, namely without masks and loupes.

Keywords: COVID-19, PPE, dentistry, pediatric

Procedia PDF Downloads 56
2743 Innovations and Challenges: Multimodal Learning in Cybersecurity

Authors: Tarek Saadawi, Rosario Gennaro, Jonathan Akeley

Abstract:

There is rapidly growing demand for professionals to fill positions in Cybersecurity. This is recognized as a national priority both by government agencies and the private sector. Cybersecurity is a very wide technical area which encompasses all measures that can be taken in an electronic system to prevent criminal or unauthorized use of data and resources. This requires defending computers, servers, networks, and their users from any kind of malicious attacks. The need to address this challenge has been recognized globally but is particularly acute in the New York metropolitan area, home to some of the largest financial institutions in the world, which are prime targets of cyberattacks. In New York State alone, there are currently around 57,000 jobs in the Cybersecurity industry, with more than 23,000 unfilled positions. The Cybersecurity Program at City College is a collaboration between the Departments of Computer Science and Electrical Engineering. In Fall 2020, The City College of New York matriculated its first students in theCybersecurity Master of Science program. The program was designed to fill gaps in the previous offerings and evolved out ofan established partnership with Facebook on Cybersecurity Education. City College has designed a program where courses, curricula, syllabi, materials, labs, etc., are developed in cooperation and coordination with industry whenever possible, ensuring that students graduating from the program will have the necessary background to seamlessly segue into industry jobs. The Cybersecurity Program has created multiple pathways for prospective students to obtain the necessary prerequisites to apply in order to build a more diverse student population. The program can also be pursued on a part-time basis which makes it available to working professionals. Since City College’s Cybersecurity M.S. program was established to equip students with the advanced technical skills needed to thrive in a high-demand, rapidly-evolving field, it incorporates a range of pedagogical formats. From its outset, the Cybersecurity program has sought to provide both the theoretical foundations necessary for meaningful work in the field along with labs and applied learning projects aligned with skillsets required by industry. The efforts have involved collaboration with outside organizations and with visiting professors designing new courses on topics such as Adversarial AI, Data Privacy, Secure Cloud Computing, and blockchain. Although the program was initially designed with a single asynchronous course in the curriculum with the rest of the classes designed to be offered in-person, the advent of the COVID-19 pandemic necessitated a move to fullyonline learning. The shift to online learning has provided lessons for future development by providing examples of some inherent advantages to the medium in addition to its drawbacks. This talk will address the structure of the newly-implemented Cybersecurity Master’s Program and discuss the innovations, challenges, and possible future directions.

Keywords: cybersecurity, new york, city college, graduate degree, master of science

Procedia PDF Downloads 116
2742 Field-Programmable Gate Array Based Tester for Protective Relay

Authors: H. Bentarzi, A. Zitouni

Abstract:

The reliability of the power grid depends on the successful operation of thousands of protective relays. The failure of one relay to operate as intended may lead the entire power grid to blackout. In fact, major power system failures during transient disturbances may be caused by unnecessary protective relay tripping rather than by the failure of a relay to operate. Adequate relay testing provides a first defense against false trips of the relay and hence improves power grid stability and prevents catastrophic bulk power system failures. The goal of this research project is to design and enhance the relay tester using a technology such as Field Programmable Gate Array (FPGA) card NI 7851. A PC based tester framework has been developed using Simulink power system model for generating signals under different conditions (faults or transient disturbances) and LabVIEW for developing the graphical user interface and configuring the FPGA. Besides, the interface system has been developed for outputting and amplifying the signals without distortion. These signals should be like the generated ones by the real power system and large enough for testing the relay’s functionality. The signals generated that have been displayed on the scope are satisfactory. Furthermore, the proposed testing system can be used for improving the performance of protective relay.

Keywords: amplifier class D, field-programmable gate array (FPGA), protective relay, tester

Procedia PDF Downloads 184
2741 High Temperature Behaviour of Various Limestone Used in Heritage Buildings at Material and Block Scales

Authors: Ayoub Daoudi, Javad Eslami, Anne-Lise Beaucour, Martin Vigroux, Albert Noumowé

Abstract:

As a fact, many cultural heritage masonry buildings have undergone violent fires during their history. In order to investigate the high temperature behaviour of stone masonry, six French limestones were heated to 600 °C at a rate of 9 °C/min. The main focus is the comparison between the high temperature behaviour of stones at the material and at the structural scale. In order to evaluate the risk of spalling, the tests have been carried out on the stone blocks (12x30x30 cm) instrumented with thermocouples and subjected to an unidirectional heating on one face. Thereafter, visual assessments and non-destructive measurements (dynamic elastic modulus) performed on blocks demonstrate a different behaviour from what was observed at the material scale. Finally, a series of thermo-mechanical computations, using finite element method, allowed us to highlight the difference between the behaviour of stones at material and block scales.

Keywords: limestones, hight temperature behaviour, damage, thermo-mechanical modeling, material and blocks scales, color change

Procedia PDF Downloads 73
2740 A Study of the Relationship between Time Management Behaviour and Job Satisfaction of Higher Education Institutes in India

Authors: Sania K. Rao, Feza T. Azmi

Abstract:

The purpose of the present study is to explore the relationship between time management behaviour and job satisfaction of academicians of higher education institutes in India. The analyses of this study were carried out with AMOS (version 20.0); and Confirmatory Factor Analysis (CFA) and Structural Equation Modelling (SEM) were conducted. The factor analysis and findings show that perceived control of time serves as the partial mediating factor to have a significant and positive influence on job satisfaction. Further, at the end, a number of suggestions to improve one’s time management behaviour were provided.

Keywords: time management behaviour, job satisfaction, higher education, India, mediation analysis

Procedia PDF Downloads 362
2739 Seaworthiness and Liability Risks Involving Technology and Cybersecurity in Transport and Logistics

Authors: Eugene Wong, Felix Chan, Linsey Chen, Joey Cheung

Abstract:

The widespread use of technologies and cyber/digital means for complex maritime operations have led to a sharp rise in global cyber-attacks. They have generated an increasing number of liability disputes, insurance claims, and legal proceedings. An array of antiquated case law, regulations, international conventions, and obsolete contractual clauses drafted in the pre-technology era have become grossly inadequate in addressing the contemporary challenges. This paper offers a critique of the ambiguity of cybersecurity liabilities under the obligation of seaworthiness entailed in the Hague-Visby Rules, which apply either by law in a large number of jurisdictions or by express incorporation into the shipping documents. This paper also evaluates the legal and technological criteria for assessing whether a vessel is properly equipped with the latest offshore technologies for navigation and cargo delivery operations. Examples include computer applications, networks and servers, enterprise systems, global positioning systems, and data centers. A critical analysis of the carriers’ obligations to exercise due diligence in preventing or mitigating cyber-attacks is also conducted in this paper. It is hoped that the present study will offer original and crucial insights to policymakers, regulators, carriers, cargo interests, and insurance underwriters closely involved in dispute prevention and resolution arising from cybersecurity liabilities.

Keywords: seaworthiness, cybersecurity, liabilities, risks, maritime, transport

Procedia PDF Downloads 111
2738 Inappropriate Job Behaviour and Performance of Employees

Authors: Prakash Singh

Abstract:

The focus of this paper is on the impact of internal organizational factors on the inappropriate job performance and behaviour of employees. The Buffalo City Metropolitan Municipality (BCMM) in South Africa has been experiencing inappropriate job behaviour and performance of some of its workers. They include misappropriation of resources, maladministration, mismanagement, lack of service delivery, fraud, and corruption. Since many workers in this organization have various levels of formal education, such practices are not expected, because the structural-functionalist assumption is that formal education is a solution to societal challenges. Since inappropriate job behaviour and performance continue to be reported in spite of the formal education of BCMM workers, this study seeks to investigate how the two phenomena co-exist. It thus seeks to put into perspective the paradoxical co-existence of formal education with inappropriate job behaviour and performance, by focusing on the BCMM as a case-study. For data collection, this study used the mixed method approach; that is, a combination of qualitative and quantitative methods. The findings revealed structural, systemic and human impediments to labour productivity in the organization. By and large, the unquestioning acceptance of the assumption that the skills shortage is responsible for inappropriate workers’ job performance and behaviour is discredited by the evidence of skilled personnel who exercise their responsibilities in a manner that undermines their occupational requirements. Therefore, this exploratory study affirms that the narrow conception of skills, that privileges job-specific capabilities, is not enough for cultivating a workforce with appropriate job behaviour and performance practices.

Keywords: inappropriate job behaviour, labour productivity, mismanagement, skills shortage

Procedia PDF Downloads 342
2737 The Effectiveness of the Counselling Module in Counseling Interventions for Low Performance Employees

Authors: Hazaila Hassan

Abstract:

This research aims and discusses about the effectiveness of the Psynnova i-Behaviour Modification Technique (iBMT) module towards the change in behaviour of low-performing employees. The purpose of the study is to examine the effectiveness of the Psynnova Module on changing behaviour through five factors among low-performing employees in the public sector. The five main factors/constructs were cognitive enhancement and rationality, emotional stability, attitude alignment and adjustment, social skills development and psycho-spirituality enhancement. In this research, 5 main constructs will be using to indicate behaviour changing performance of the employees after attending The Psynnova Program that using this Psynnova IBMT Module. The respondents are among those who have low scores in terms of annual performance through annual performance value reports and have gone through various stages before being required to attend Psynnova Program. Besides that, the research plan was also to critically examine and understand the change in behaviour among the low-performing employees through the five dimensions in the Psynnova Module. A total of 50 respondent will purposively sampled to be the respondents of this research. This study will use the Experimental Method to One Group Purposively Pre and Post Test using the Time Series Design. Experimental SPSS software version 22.0 will be used to analyse this data. Hopefully this research can see the changing of their behaviour in five factors as an indicator to the respondent after attending the Psynnova Programme. Findings from this study are also used to propose to assisting psychologist to see the changes that occurred to the respondents with the best framework of behaviour changing for them.

Keywords: five dimension of behaviour changing, among adult, low performance, modul effectiveness

Procedia PDF Downloads 135
2736 Teaching Ethical Behaviour: Conversational Analysis in Perspective

Authors: Nikhil Kewalkrishna Mehta

Abstract:

In the past researchers have questioned the effectiveness of ethics training in higher education. Also, there are observations that support the view that ethical behaviour (range of actions)/ethical decision making models used in the past make use of vignettes to explain ethical behaviour. The understanding remains in the perspective that these vignettes play a limited role in determining individual intentions and not actions. Some authors have also agreed that there are possibilities of differences in one’s intentions and actions. This paper makes an attempt to fill those gaps by evaluating real actions rather than intentions. In a way this study suggests the use of an experiential methodology to explore Berlo’s model of communication as an action along with orchestration of various principles. To this endeavor, an attempt was made to use conversational analysis in the pursuance of evaluating ethical decision making behaviour among students and middle level managers. The process was repeated six times with the set of an average of 15 participants. Similarities have been observed in the behaviour of students and middle level managers that calls for understanding that both the groups of individuals have no cognizance of their actual actions. The deliberations derived out of conversation were taken a step forward for meta-ethical evaluations to portray a clear picture of ethical behaviour among participants. This study provides insights for understanding demonstrated unconscious human behaviour which may fortuitously be termed both ethical and unethical.

Keywords: ethical behaviour, unethical behavior, ethical decision making, intentions and actions, conversational analysis, human actions, sensitivity

Procedia PDF Downloads 217
2735 Effect of Repellent Coatings, Aerosol Protective Liners, and Lamination on the Properties of Chemical/Biological Protective Textiles

Authors: Natalie Pomerantz, Nicholas Dugan, Molly Richards, Walter Zukas

Abstract:

The primary research question to be answered for Chemical/Biological (CB) protective clothing, is how to protect wearers from a range of chemical and biological threats in liquid, vapor, and aerosol form, while reducing the thermal burden. Currently, CB protective garments are hot, heavy, and wearers are limited by short work times in order to prevent heat injury. This study demonstrates how to incorporate different levels of protection on a material level and modify fabric composites such that the thermal burden is reduced to such an extent it approaches that of a standard duty uniform with no CB protection. CB protective materials are usually comprised of several fabric layers: a cover fabric with a liquid repellent coating, a protective layer which is comprised of a carbon-based sorptive material or semi-permeable membrane, and a comfort next-to-skin liner. In order to reduce thermal burden, all of these layers were laminated together to form one fabric composite which had no insulative air gap in between layers. However, the elimination of the air gap also reduced the CB protection of the fabric composite. In order to increase protection in the laminated composite, different nonwoven aerosol protective liners were added, and a super repellent coating was applied to the cover fabric, prior to lamination. Different adhesive patterns were investigated to determine the durability of the laminate with the super repellent coating, and the effect on air permeation. After evaluating the thermal properties, textile properties and protective properties of the iterations of these fabric composites, it was found that the thermal burden of these materials was greatly reduced by decreasing the thermal resistance with the elimination of the air gap between layers. While the level of protection was reduced in laminate composites, the addition of a super repellent coating increased protection towards low volatility agents without impacting thermal burden. Similarly, the addition of aerosol protective liner increased protection without reducing water vapor transport, depending on the nonwoven used, however, the air permeability was significantly decreased. The balance of all these properties and exploration of the trade space between thermal burden and protection will be discussed.

Keywords: aerosol protection, CBRNe protection, lamination, nonwovens, repellent coatings, thermal burden

Procedia PDF Downloads 332
2734 Teachers’ Protective Factors of Resilience Scale: Factorial Structure, Validity and Reliability Issues

Authors: Athena Daniilidou, Maria Platsidou

Abstract:

Recently developed scales addressed -specifically- teachers’ resilience. Although they profited from the field, they do not include some of the critical protective factors of teachers’ resilience identified in the literature. To address this limitation, we aimed at designing a more comprehensive scale for measuring teachers' resilience which encompasses various personal and environmental protective factors. To this end, two studies were carried out. In Study 1, 407 primary school teachers were tested with the new scale, the Teachers’ Protective Factors of Resilience Scale (TPFRS). Similar scales, such as the Multidimensional Teachers’ Resilience Scale and the Teachers’ Resilience Scale), were used to test the convergent validity, while the Maslach Burnout Inventory and the Teachers’ Sense of Efficacy Scale was used to assess the discriminant validity of the new scale. The factorial structure of the TPFRS was checked with confirmatory factor analysis and a good fit of the model to the data was found. Next, item response theory analysis using a two-parameter model (2PL) was applied to check the items within each factor. It revealed that 9 items did not fit the corresponding factors well and they were removed. The final version of the TPFRS includes 29 items, which assess six protective factors of teachers’ resilience: values and beliefs (5 items, α=.88), emotional and behavioral adequacy (6 items, α=.74), physical well-being (3 items, α=.68), relationships within the school environment, (6 items, α=.73) relationships outside the school environment (5 items, α=.84), and the legislative framework of education (4 items, α=.83). Results show that it presents a satisfactory convergent and discriminant validity. Study 2, in which 964 primary and secondary school teachers were tested, confirmed the factorial structure of the TPFRS as well as its discriminant validity, which was tested with the Schutte Emotional Intelligence Scale-Short Form. In conclusion, our results confirmed that the TPFRS is a valid instrument for assessing teachers' protective factors of resilience and it can be safely used in future research and interventions in the teaching profession. In conclusion, our results showed that the TPFRS is a new multi-dimensional instrument valid for assessing teachers' protective factors of resilience and it can be safely used in future research and interventions in the teaching profession.

Keywords: resilience, protective factors, teachers, item response theory

Procedia PDF Downloads 56
2733 Streamlining Cybersecurity Risk Assessment for Industrial Control and Automation Systems: Leveraging the National Institute of Standard and Technology’s Risk Management Framework (RMF) Using Model-Based System Engineering (MBSE)

Authors: Gampel Alexander, Mazzuchi Thomas, Sarkani Shahram

Abstract:

The cybersecurity landscape is constantly evolving, and organizations must adapt to the changing threat environment to protect their assets. The implementation of the NIST Risk Management Framework (RMF) has become critical in ensuring the security and safety of industrial control and automation systems. However, cybersecurity professionals are facing challenges in implementing RMF, leading to systems operating without authorization and being non-compliant with regulations. The current approach to RMF implementation based on business practices is limited and insufficient, leaving organizations vulnerable to cyberattacks resulting in the loss of personal consumer data and critical infrastructure details. To address these challenges, this research proposes a Model-Based Systems Engineering (MBSE) approach to implementing cybersecurity controls and assessing risk through the RMF process. The study emphasizes the need to shift to a modeling approach, which can streamline the RMF process and eliminate bloated structures that make it difficult to receive an Authorization-To-Operate (ATO). The study focuses on the practical application of MBSE in industrial control and automation systems to improve the security and safety of operations. It is concluded that MBSE can be used to solve the implementation challenges of the NIST RMF process and improve the security of industrial control and automation systems. The research suggests that MBSE provides a more effective and efficient method for implementing cybersecurity controls and assessing risk through the RMF process. The future work for this research involves exploring the broader applicability of MBSE in different industries and domains. The study suggests that the MBSE approach can be applied to other domains beyond industrial control and automation systems.

Keywords: authorization-to-operate (ATO), industrial control systems (ICS), model-based system’s engineering (MBSE), risk management framework (RMF)

Procedia PDF Downloads 55
2732 Effect of Hooked-End Steel Fibres Geometry on Pull-Out Behaviour of Ultra-High Performance Concrete

Authors: Sadoon Abdallah, Mizi Fan, Xiangming Zhou

Abstract:

In this study, a comprehensive approach has been adopted to examine in detail the effect of various hook geometries on bond-slip characteristics. Extensive single fibre pull-out tests on ultra-high performance matrix with three different W/B ratios and embedded lengths have been carried out. Test results showed that the mechanical deformation of fibre hook is the main mechanism governing the pull-out behaviour. Furthermore, the quantitative analyses have been completed to compare the hook design contribution of 3D, 4D and 5D fibres to assess overall pull-out behaviour. It was also revealed that there is a strong relationship between the magnitude of hook contribution and W/B ratio (i.e. matrix strength). Reducing the W/B ratio from 0.20 to 0.11 greatly optimizes the interfacial transition zone (ITZ) and enables better mobilization, straightening of the hook and results in bond-slip-hardening behaviour.

Keywords: bobond mechanisms, fibre-matrix interface, hook geometry, pullout behaviour and water to binder ratio

Procedia PDF Downloads 344
2731 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 177
2730 Integrating a Security Operations Centre with an Organization’s Existing Procedures, Policies and Information Technology Systems

Authors: M. Mutemwa

Abstract:

A Cybersecurity Operation Centre (SOC) is a centralized hub for network event monitoring and incident response. SOCs are critical when determining an organization’s cybersecurity posture because they can be used to detect, analyze and report on various malicious activities. For most organizations, a SOC is not part of the initial design and implementation of the Information Technology (IT) environment but rather an afterthought. As a result, it is not natively a plug and play component; therefore, there are integration challenges when a SOC is introduced into an organization. A SOC is an independent hub that needs to be integrated with existing procedures, policies and IT systems of an organization such as the service desk, ticket logging system, reporting, etc. This paper discussed the challenges of integrating a newly developed SOC to an organization’s existing IT environment. Firstly, the paper begins by looking at what data sources should be incorporated into the Security Information and Event Management (SIEM) such as which host machines, servers, network end points, software, applications, web servers, etc. for security posture monitoring. That is which systems need to be monitored first and the order by which the rest of the systems follow. Secondly, the paper also describes how to integrate the organization’s ticket logging system with the SOC SIEM. That is how the cybersecurity related incidents should be logged by both analysts and non-technical employees of an organization. Also the priority matrix for incident types and notifications of incidents. Thirdly, the paper looks at how to communicate awareness campaigns from the SOC and also how to report on incidents that are found inside the SOC. Lastly, the paper looks at how to show value for the large investments that are poured into designing, building and running a SOC.

Keywords: cybersecurity operation centre, incident response, priority matrix, procedures and policies

Procedia PDF Downloads 121
2729 An Approach to Improve Pre University Students' Responsible Environmental Behaviour through Science Writing Heuristic in Malaysia

Authors: Sheila Shamuganathan, Mageswary Karpudewan

Abstract:

This study investigated the effectiveness of green chemistry integrated with Science Writing Heuristic (SWH) in enhancing matriculation students’ responsible environmental behaviour. For this purpose 207 matriculation students were randomly assigned into experimental (N=118) and control (N=89) group. For the experimental group the chemistry concepts were taught using the instructional approach of green chemistry integrated with Science Writing Heuristic (SWH) while for the control group the same content was taught using green chemistry. The data was analysed using ANCOVA and findings obtained from the quantitative analysis reveals that there is significant changes in responsible environmental behaviour (F 1,204) = 32.13 (ηp² = 0.14) which favours the experimental group. The responses of the qualitative data obtained from an interview with the experimental group also further strengthen and indicated a significant improvement in responsible environmental behaviour. The outcome of the study suggests that using green chemistry integrated with Science Writing Heuristic (SWH) could be an alternative approach to improve students’ responsible environmental behaviour towards the environment.

Keywords: science writing heuristic, green chemistry, pro environmental behaviour, laboratory

Procedia PDF Downloads 282
2728 Occupant Behaviour Change in Post-Pandemic Australia

Authors: Yan Zhang, Felix Kin Peng Hui, Colin Duffield, Caroline X. Gao

Abstract:

In post-pandemic Australia, it is unclear how building occupant have changed their behaviour in their interaction with buildings and other occupants. This research provides information on occupant behaviour change compared to before the pandemic and examines the predictors for those behaviour changes. This paper analyses survey responses from 2298 building occupants in Melbourne to investigate occupant behaviour change and determinants for those changes one year after the pandemic in Australia. The behaviour changes were grouped into three categories based on respiratory infection routes: (1) fomite: hand-shaking and hand hygiene behaviours; (2) airborne: individual interventions to indoor air quality such as face masking, window openings for occupants working in naturally ventilated space; (3) droplets: social distancing, reducing working hours in the workplace. The survey shows that the pandemic has significantly changed occupants' behaviour in all three categories compared to before the pandemic. The changes are significantly associated with occupants' perceived indoor air quality, indoor environmental cleanliness, and occupant density, demonstrating their growing awareness of respiratory infection risk that influences their health behaviours. The two most significant factors identified from multivariate regressions to drive the behaviour change include occupant risk perception of respiratory infections at the workplace and their observed co-worker's behaviour change. Based on the survey results, the paper provides adjusted estimates for related occupant behaviour parameters. The study also discusses alternatives for managing window operations in naturally ventilated buildings to improve occupant satisfaction. This paper could help Building Managers, and Building Designers understand occupant behaviour change to improve building operations and new building design to enhance occupant experience. Also, building energy modellers and risk assessors may use the findings to adjust occupant behaviour-related parameters to improve the models. The findings contribute to the knowledge of Human-Building Interaction.

Keywords: human-building interaction, risk perception, occupant behaviour, IAQ, COVID-19

Procedia PDF Downloads 39
2727 The Study of X- Bracing on Limit State Behaviour of Buckling Restrained Brace (BRB) in Steel Frames Using Pushover Analysis

Authors: Peyman Shadman Heidari, Hamid Bastani, Pouya Shadman Heidari

Abstract:

Nowadays, using energy dampers in structures is highly considered for the dissipation and absorption of earthquake energy. The main advantage of using energy damper is absorbing the earthquake energy in some sections apart from the structure frame. Among different types of dampers, hysteresis dampers are of special place because of low cost, high reliability and the lack of mechanical parts. In this paper, a special kind of hysteresis damper is considered under the name of buckling brace, which is provided with the aim of the study and investigation of cross braces in boundary behaviour of steel frames using nonlinear static analysis. In this paper, ninety three models of steel frames with cross braces of buckling type are processed with different bays and heights and their plasticity index, behaviour coefficient, distribution type and the number of plastic hinges formed were calculated. Finally, the mean behaviour coefficient was compared with standard behaviour coefficient of 2800 and the suitable mode of braces placing in improving nonlinear behaviour and suitable distribution of plastic hinges were presented. In addition, it was determined that for some placing mode of braces the behaviour coefficient will increase to 15 times of recommended 2800 standard coefficient and in some placing modes, the braced bays will show considerable difference with suggested 2800 standard behaviour coefficient relative to each other.

Keywords: buckling restrained brace, plasticity index, behaviour coefficient, resistance coefficient, plastic joints

Procedia PDF Downloads 483
2726 Simulation of Low Cycle Fatigue Behaviour of Nickel-Based Alloy at Elevated Temperatures

Authors: Harish Ramesh Babu, Marco Böcker, Mario Raddatz, Sebastian Henkel, Horst Biermann, Uwe Gampe

Abstract:

Thermal power machines are subjected to cyclic loading conditions under elevated temperatures. At these extreme conditions, the durability of the components has a significant influence. The material mechanical behaviour has to be known in detail for a failsafe construction. For this study a nickel-based alloy is considered, the deformation and fatigue behaviour of the material is analysed under cyclic loading. A viscoplastic model is used for calculating the deformation behaviour as well as to simulate the rate-dependent and cyclic plasticity effects. Finally, the cyclic deformation results of the finite element simulations are compared with low cycle fatigue (LCF) experiments.

Keywords: complex low cycle fatigue, elevated temperature, fe-simulation, viscoplastic

Procedia PDF Downloads 199
2725 Characteristic Components in Cornusofficinalis to AGEs Injury Protective Effect and Mechanism of HUVEC

Authors: Yu-Han Tao, Hui-Qin Xu

Abstract:

The present study aimed to explain the protective effect of Cornus officinalis characteristic components, under AGEs damage to HUVEC. After cultured HUVEC adhered, Cornus officinalis characteristic components such as loganin, morroniside, oleanolic acid, ursolic acid and aminoguanidine (positive control dug) hatched, after 1h the AGEs (200 mg/L) were added. After 24h, LDH, SOD, MDA, NO, ET, and AngⅡ, TGF-β, IL-1β, ROS in the supernatant were determined. The results showed the Cornus officinalis characteristic compounds could improve vitality of SOD, NO, reduce the MDA, ET, AngⅡ, TGF-β, IL-1β, ROS significantly when compared with the model groug. Loganin, oleanic acid, ursolic acid, had significant protective effect on AGEs injured HUVEC. As a conclusion, characteristic components in Cornus officinalis had a positive effect after HUVEC injured by AGEs.

Keywords: Cornus officinalis, morroniside, oganin, oleanolic acid, ursolic acid

Procedia PDF Downloads 345
2724 A Comparative Analysis of Traditional and Advanced Methods in Evaluating Anti-corrosion Performance of Sacrificial and Barrier Coatings

Authors: Kazem Sabet-Bokati, Ilia Rodionov, Marciel Gaier, Kevin Plucknett

Abstract:

Protective coatings play a pivotal role in mitigating corrosion and preserving the integrity of metallic structures exposed to harsh environmental conditions. The diversity of corrosive environments necessitates the development of protective coatings suitable for various conditions. Accurately selecting and interpreting analysis methods is crucial in identifying the most suitable protective coatings for the various corrosive environments. This study conducted a comprehensive comparative analysis of traditional and advanced methods to assess the anti-corrosion performance of sacrificial and barrier coatings. The protective performance of pure epoxy, zinc-rich epoxy, and cold galvanizing coatings was evaluated using salt spray tests, together with electrochemical impedance spectroscopy (EIS) and potentiodynamic polarization methods. The performance of each coating was thoroughly differentiated under both atmospheric and immersion conditions. The distinct protective performance of each coating against atmospheric corrosion was assessed using traditional standard methods. Additionally, the electrochemical responses of these coatings in immersion conditions were systematically studied, and a detailed discussion on interpreting the electrochemical responses is provided. Zinc-rich epoxy and cold galvanizing coatings offer superior anti-corrosion performance against atmospheric corrosion, while the pure epoxy coating excels in immersion conditions.

Keywords: corrosion, barrier coatings, sacrificial coatings, salt-spray, EIS, polarization

Procedia PDF Downloads 24
2723 A Case Study of Decision Making and Adjustment Behaviour of Visually Challenged Adolescents

Authors: Bincy Mathew, B. William Dharma Raja

Abstract:

Successful decision making in a social setting depends on the ability to understand the intentions, emotions and beliefs of others. Children live and grow in the social world. Individuals think to satisfy their curiosity and mush of their social thought is practical, to attain their goal. Children’s thought about their social world influences how they behave towards it. The main purpose of this paper is to review the influence of decision making on adjustment behaviour of visually challenged adolescents. The sample was purposively selected to study the cases of two of the visually challenged adolescents from a Special School, in Tirunelveli, Tamil Nadu, India. The authors appraised the observed behaviour of adjustment in these children. It may be concluded that the social cognitive ability of decision making is at least, to certain extent, influences adjustment behaviour of visually challenged adolescents. Adjustment behaviour attempts to maintain a child’s level of physiological and psychological equilibrium and it is directed towards tension reduction. It involves a state of harmonious relationship existing between the individual and one’s environment so that adjustment is a matter of interaction between the capacities of the individual and the demands of the environment. The study also found that music induces a receptive mood that generally enhances cognitive processing and every decision that the child makes has its brunt on the behaviour. It is solely based on the case study carried out by the authors.

Keywords: social cognition, decision making, adjustment behaviour, adolescents

Procedia PDF Downloads 224
2722 The Protective Effect of Grape Seed Oil with Use of Ciprofloxacin Induced Germ Cell Toxicity in Male Albino Mice

Authors: Galawezh Obaid Othman

Abstract:

The present investigation was undertaken to evaluate the germ cell toxicity induced by ciprofloxacin antibiotic and the Protective effect of grape seed oil, Ciproflaxin uses include treatment of genitor-urinary and some reproductive tract bacterial infections. One of the most attractive approaches to disease prevention involves the use of natural antioxidants to protect tissue against toxic injury, the possible protective effect of grape seed oil, against ciprofloxacin induced reproductive toxicity on mouse .the animals were randomly divided into four groups consisting of five mice. Group (1) was orally given distilled water (solvent of the used drugs) and kept as a control. Group (2) was administered 6ml/kg. b.w of grape seed oil orally 15 days .Group (3) was administered 206mg/kg. b.w of ciprofloxacin orally for 15 days.. Last group was treated orally with Grape seed oil (6mg/kg b.w. /day) prior to an orally administered ciprofloxacin (CPX) at a dose of 206 mg⁄kg. b.w. by three hours for fifteen days. Ciproflaxin have ability to induce various types of sperm abnormalities such as (Sperm without head, sperm without tail, defective head spearm,swollen head sperm ), The results explored that Grape seed oil possesses statistically significant (p<0.05) protective potential against Ciproflaxin by decreasing sperm abnormalities frequency in mouse.

Keywords: antimutagen, ciprofloxacin, grape seed oil, germ cell

Procedia PDF Downloads 413
2721 Reactive Fabrics for Chemical Warfare Agent Decomposition Using Particle Crystallization

Authors: Myungkyu Park, Minkun Kim, Sunghoon Kim, Samgon Ryu

Abstract:

Recently, research for reactive fabrics which have the characteristics of CWA (Chemical Warfare Agent) decomposition is being performed actively. The performance level of decomposition for CWA decomposition in various environmental condition is one of the critical factors in applicability as protective materials for NBC (Nuclear, Biological, and Chemical) protective clothing. In this study, results of performance test for CWA decomposition by reactive fabric made of electrospinning web and reactive particle are presented. Currently, the MOF (metal organic framework) type of UiO-66-NH₂ is frequently being studied as material for decomposing CWA especially blister agent HD [Bis(2-chloroethyl) sulfide]. When we test decomposition rate with electrospinning web made of PVB (Polyvinyl Butiral) polymer and UiO-66-NH₂ particle, we can get very high protective performance than the case other particles are applied. Furthermore, if the repellant surface fabric is added on reactive material as the component of protective fabric, the performance of layer by layered reactive fabric could be approached to the level of current NBC protective fabric for HD decomposition rate. Reactive fabric we used in this study is manufactured by electrospinning process of polymer which contains the reactive particle of UiO-66-NH₂, and we performed crystalizing process once again on that polymer fiber web in solvent systems as a second step for manufacturing reactive fabric. Three kinds of polymer materials are used in this process, but PVB was most suitable as an electrospinning fiber polymer considering the shape of product. The density of particle on fiber web and HD decomposition rate is enhanced by secondary crystallization compared with the results which are not processed. The amount of HD penetration by 24hr AVLAG (Aerosol Vapor Liquid Assessment Group) swatch test through the reactive fabrics with secondary crystallization and without crystallization is 24 and 146μg/cm² respectively. Even though all of the reactive fiber webs for this test are combined with repellant surface layer at outer side of swatch, the effects of secondary crystallization of particle for the reactive fiber web are remarkable.

Keywords: CWA, Chemical Warfare Agent, gas decomposition, particle growth, protective clothing, reactive fabric, swatch test

Procedia PDF Downloads 250
2720 Fusion Models for Cyber Threat Defense: Integrating Clustering, Random Forests, and Support Vector Machines to Against Windows Malware

Authors: Azita Ramezani, Atousa Ramezani

Abstract:

In the ever-escalating landscape of windows malware the necessity for pioneering defense strategies turns into undeniable this study introduces an avant-garde approach fusing the capabilities of clustering random forests and support vector machines SVM to combat the intricate web of cyber threats our fusion model triumphs with a staggering accuracy of 98.67 and an equally formidable f1 score of 98.68 a testament to its effectiveness in the realm of windows malware defense by deciphering the intricate patterns within malicious code our model not only raises the bar for detection precision but also redefines the paradigm of cybersecurity preparedness this breakthrough underscores the potential embedded in the fusion of diverse analytical methodologies and signals a paradigm shift in fortifying against the relentless evolution of windows malicious threats as we traverse through the dynamic cybersecurity terrain this research serves as a beacon illuminating the path toward a resilient future where innovative fusion models stand at the forefront of cyber threat defense.

Keywords: fusion models, cyber threat defense, windows malware, clustering, random forests, support vector machines (SVM), accuracy, f1-score, cybersecurity, malicious code detection

Procedia PDF Downloads 35