Search results for: demolition threat
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1091

Search results for: demolition threat

1091 Production and Recycling of Construction and Demolition Waste

Authors: Vladimira Vytlacilova

Abstract:

Recycling of construction and demolition waste (C&DW) and their new reuse in structures is one of the solutions of environmental problems. Construction and demolition waste creates a major portion of total solid waste production in the world and most of it is used in landfills all the time. The paper deals with the situation of the recycling of the building and demolition waste in the Czech Republic during the recent years. The paper is dealing with questions of C&D waste recycling, it also characterizes construction and demolition waste in general, furthermore it analyses production of construction waste and subsequent production of recycled materials.

Keywords: Recycling, Construction and demolition waste, Recycled rubble, Waste management

Procedia PDF Downloads 271
1090 Study on the Demolition Waste Management in Malaysia Construction Industry

Authors: Gunalan Vasudevan

Abstract:

The Malaysia construction industry generates a large quantity of construction and demolition waste nowadays. In the handbook for demolition work only comprised small portion of demolition waste management. It is important to study and determine the ways to provide a practical guide for the professional in the building industry about handling the demolition waste. In general, demolition defined as tearing down or wrecking of structural work or architectural work of the building and other infrastructures work such as road, bridge and etc. It’s a common misconception that demolition is nothing more than taking down a structure and carrying the debris to a landfill. On many projects, 80-90% of the structure is kept for reuse or recycling which help the owner to save cost. Demolition contractors required a lot of knowledge and experience to minimize the impact of demolition work to the existing surrounding area. For data collecting method, postal questionnaires and interviews have been selected to collect data. Questionnaires have distributed to 80 respondents from the construction industry in Klang Valley. 67 of 80 respondents have replied the questionnaire while 4 people have interviewed. Microsoft Excel and Statistical Package for Social Science version 17.0 were used to analyze the data collected.

Keywords: demolition, waste management, construction material, Malaysia

Procedia PDF Downloads 409
1089 An Optimization Model for Waste Management in Demolition Works

Authors: Eva Queheille, Franck Taillandier, Nadia Saiyouri

Abstract:

Waste management has become a major issue in demolition works, because of its environmental impact (energy consumption, resource consumption, pollution…). However, improving waste management requires to take also into account the overall demolition process and to consider demolition main objectives (e.g. cost, delay). Establishing a strategy with these conflicting objectives (economic and environment) remains complex. In order to provide a decision-support for demolition companies, a multi-objective optimization model was developed. In this model, a demolition strategy is computed from a set of 80 decision variables (worker team composition, machines, treatment for each type of waste, choice of treatment platform…), which impacts the demolition objectives. The model has experimented on a real-case study (demolition of several buildings in France). To process the optimization, different optimization algorithms (NSGA2, MOPSO, DBEA…) were tested. Results allow the engineer in charge of this case, to build a sustainable demolition strategy without affecting cost or delay.

Keywords: deconstruction, life cycle assessment, multi-objective optimization, waste management

Procedia PDF Downloads 115
1088 Recycled Aggregates from Construction and Demolition Waste Suitable for Concrete Production

Authors: Vladimira Vytlacilova

Abstract:

This study presents the latest research trend in the discipline of construction and demolition (C&D) waste management in Czech Republic. The results of research interest exhibit an increasing research interest in C&D waste management practices in recent years. Construction and demolition waste creates a major portion of total solid waste production in the world and most of it is used in landfills, for reclamation or landscaping all the time. The quality of recycled aggregates for use in concrete construction depends on recycling practices. Classifications, composition and contaminants influence the mechanical-physical properties as well as environmental risks related to its utilization. The second part of contribution describes properties of fibre reinforced concrete with the full replacement of natural aggregate by recycled one (concrete or masonry rubble).

Keywords: construction and demolition waste, fibre reinforced concrete, recycled aggregate, recycling, waste management

Procedia PDF Downloads 276
1087 The Utilization of Recycled Construction and Demolition Waste Aggregate in Asphaltic Concrete

Authors: Inas Kamel, Noor Z. Habib

Abstract:

Utilizing construction and demolition wastes in hotmix asphalt (HMA) pavement construction can reduce the adverse environmental effect of its inadequate disposal and reduce the pressure of extracting and processing mineral aggregates (MA). This study aims to examine the viability of replacing MA by recycled construction and demolition waste aggregates (RCDWA) in the wearing course of asphaltic concrete (AC) pavements without compromising its loadbearing capacity. The Marshall Method was used to evaluate the performance of AC wearing course specimens by replacing MA by 10%, 20% and 30% RCDWA. Grade 60/70 bitumen was used in the range 3.0-5.5%, with 05% increments, to generate the optimum bitumen content (OBC). From the volumetric analysis and test property curves, the mixture containing 20% RCDWA was chosen as the preferred mix at 5.1% OBC. It possessed a 10% increase in Marshall Stability compared to the reference specimen, containing 100% MA, and a 6% increase in Marshall flow.

Keywords: aggregate, asphaltic concrete, Marshall method, optimum bitumen content, recycled construction and demolition waste

Procedia PDF Downloads 117
1086 Evaluating Structural Crack Propagation Induced by Soundless Chemical Demolition Agent Using an Energy Release Rate Approach

Authors: Shyaka Eugene

Abstract:

The efficient and safe demolition of structures is a critical challenge in civil engineering and construction. This study focuses on the development of optimal demolition strategies by investigating the crack propagation behavior in beams induced by soundless cracking agents. It is commonly used in controlled demolition and has gained prominence due to its non-explosive and environmentally friendly nature. This research employs a comprehensive experimental and computational approach to analyze the crack initiation, propagation, and eventual failure in beams subjected to soundless cracking agents. Experimental testing involves the application of various cracking agents under controlled conditions to understand their effects on the structural integrity of beams. High-resolution imaging and strain measurements are used to capture the crack propagation process. In parallel, numerical simulations are conducted using advanced finite element analysis (FEA) techniques to model crack propagation in beams, considering various parameters such as cracking agent composition, loading conditions, and beam properties. The FEA models are validated against experimental results, ensuring their accuracy in predicting crack propagation patterns. The findings of this study provide valuable insights into optimizing demolition strategies, allowing engineers and demolition experts to make informed decisions regarding the selection of cracking agents, their application techniques, and structural reinforcement methods. Ultimately, this research contributes to enhancing the safety, efficiency, and sustainability of demolition practices in the construction industry, reducing environmental impact and ensuring the protection of adjacent structures and the surrounding environment.

Keywords: expansion pressure, energy release rate, soundless chemical demolition agent, crack propagation

Procedia PDF Downloads 32
1085 Preserving Egypt's Cultural Heritage Amidst Urban Development: A Case Study of the Historic Cairo Cemetery

Authors: Ali Mahfouz

Abstract:

Egypt's cultural heritage and artistic riches find themselves at a complex intersection of preservation and urban development, where they face intricate challenges exacerbated by climate change, pollution, urbanization, and construction activities. In this research, it delves into the multifaceted dynamics involved in conserving Egypt's heritage within urban contexts, spotlighting the historic Cairo cemetery as a poignant and timely case study. The historic Cairo cemetery serves as a repository of priceless cultural assets, housing the final resting places of public figures, artists, historians, politicians, and other luminaries. These graves are adorned with magnificent artworks and rare tombstones, collectively representing an irreplaceable slice of Egypt's history and culture. Yet, the looming threat of demolition to make way for new infrastructure projects underscores the delicate equilibrium that preservation efforts must maintain in the face of urban development pressures. This paper illuminates the collaborative efforts of historians, intellectuals, and civil society organizations who are determined to forestall the destruction of this invaluable cultural heritage. Their initiatives, driven by a shared commitment to documenting and safeguarding the cemetery's treasures, underscore the urgent imperative of protecting Egypt's cultural legacy. Through this case study, It gain insights into how Egypt navigates the challenges of preserving its rich heritage amidst urban expansion and a changing climate, emphasizing the broader importance of heritage conservation in an evolving world.

Keywords: Egypt’s cultural heritage, urban development, historic Cairo cemetery, tombstone artworks, demolition threat, heritage conservation, civil society initiatives

Procedia PDF Downloads 44
1084 Nanoparticle Exposure Levels in Indoor and Outdoor Demolition Sites

Authors: Aniruddha Mitra, Abbas Rashidi, Shane Lewis, Jefferson Doehling, Alexis Pawlak, Jacob Schwartz, Imaobong Ekpo, Atin Adhikari

Abstract:

Working or living close to demolition sites can increase risks of dust-related health problems. Demolition of concrete buildings may produce crystalline silica dust, which can be associated with a broad range of respiratory diseases including silicosis and lung cancers. Previous studies demonstrated significant associations between demolition dust exposure and increase in the incidence of mesothelioma or asbestos cancer. Dust is a generic term used for minute solid particles of typically <500 µm in diameter. Dust particles in demolition sites vary in a wide range of sizes. Larger particles tend to settle down from the air. On the other hand, the smaller and lighter solid particles remain dispersed in the air for a long period and pose sustained exposure risks. Submicron ultrafine particles and nanoparticles are respirable deeper into our alveoli beyond our body’s natural respiratory cleaning mechanisms such as cilia and mucous membranes and are likely to be retained in the lower airways. To our knowledge, how various demolition tasks release nanoparticles are largely unknown and previous studies mostly focused on course dust, PM2.5, and PM10. General belief is that the dust generated during demolition tasks are mostly large particles formed through crushing, grinding, or sawing of various concrete and wooden structures. Therefore, little consideration has been given to the generated submicron ultrafine and nanoparticles and their exposure levels. These data are, however, critically important because recent laboratory studies have demonstrated cytotoxicity of nanoparticles on lung epithelial cells. The above-described knowledge gaps were addressed in this study by a novel newly developed nanoparticle monitor, which was used for nanoparticle monitoring at two adjacent indoor and outdoor building demolition sites in southern Georgia. Nanoparticle levels were measured (n = 10) by TSI NanoScan SMPS Model 3910 at four different distances (5, 10, 15, and 30 m) from the work location as well as in control sites. Temperature and relative humidity levels were recorded. Indoor demolition works included acetylene torch, masonry drilling, ceiling panel removal, and other miscellaneous tasks. Whereas, outdoor demolition works included acetylene torch and skid-steer loader use to remove a HVAC system. Concentration ranges of nanoparticles of 13 particle sizes at the indoor demolition site were: 11.5 nm: 63 – 1054/cm³; 15.4 nm: 170 – 1690/cm³; 20.5 nm: 321 – 730/cm³; 27.4 nm: 740 – 3255/cm³; 36.5 nm: 1,220 – 17,828/cm³; 48.7 nm: 1,993 – 40,465/cm³; 64.9 nm: 2,848 – 58,910/cm³; 86.6 nm: 3,722 – 62,040/cm³; 115.5 nm: 3,732 – 46,786/cm³; 154 nm: 3,022 – 21,506/cm³; 205.4 nm: 12 – 15,482/cm³; 273.8 nm: Keywords: demolition dust, industrial hygiene, aerosol, occupational exposure

Procedia PDF Downloads 401
1083 Using Social Network Analysis for Cyber Threat Intelligence

Authors: Vasileios Anastopoulos

Abstract:

Cyber threat intelligence assists organizations in understanding the threats they face and helps them make educated decisions on preparing their defenses. Sharing of threat intelligence and threat information is increasingly leveraged by organizations and enterprises, and various software solutions are already available, with the open-source malware information sharing platform (MISP) being a popular one. In this work, a methodology for the production of cyber threat intelligence using the threat information stored in MISP is proposed. The methodology leverages the discipline of social network analysis and the diamond model, a model used for intrusion analysis, to produce cyber threat intelligence. The workings are demonstrated with a case study on a production MISP instance of a real organization. The paper concluded with a discussion on the proposed methodology and possible directions for further research.

Keywords: cyber threat intelligence, diamond model, malware information sharing platform, social network analysis

Procedia PDF Downloads 126
1082 Flexural Behavior of Geocell Reinforced Subgrade with Demolition Waste as Infill Material

Authors: Mahima D, Sini T

Abstract:

The use of geocell in subgrade has been previously studied by various researchers in the past. It was observed that the infill material used could affect the performance of the geocell reinforced subgrade. So, the use of waste materials as infill in geocell reinforced subgrade may prove to be more effective, economical, and environment-friendly. The performance of demolition waste as an infill was studied using flexure testing, and we compared the results with that of the other infill materials; soil and sand. Flexural behaviour is very important to the geosynthetic application in pavements as it acts as a the geocell reinforcement acts as flexible layer embedded in pavements and leads to an improvement in stress distribution and reduction in stress on the soil subgrade. The flexural behaviour was determined using four-point bending tests and results were expressed in terms of modulus improvement factor (MIF) and load-deflection behaviour. The geocell reinforced subgrade with different infill materials was tested for flexural behaviour in a polywood-polywood three-layered beam model. The deflections of the three-layered model beam were measured for the corresponding load increments. Elastic modulus of the soil-geocell composite was calculated using closed-form solutions. Geocells were prepared from geonets with three different aspect ratios 0.45, 0.67, and 1. The demolition waste infilled geocell mattress with aspect ratio 0.67 showed improved flexural behavior with MIF of 2.67 followed by soil and sand. Owing to its improved flexural resistance as seen from the MIF and load-deflection behivour, crushed demolition waste can be effectively used as infill material for geocell reinforced subgrade, thereby reducing the difficulties in the management of demolition waste and improving the load distribution of weaker subgrade.

Keywords: demolition waste, flexural behavior, geocell, modulus improvement factor

Procedia PDF Downloads 99
1081 Creativity and Stereotype Threat: Analysis of the Impact of Creativity on Eliminating the Stereotype Threat in the Educational Setting

Authors: Aleksandra Gajda

Abstract:

Among students between 12 and 13, the probability of activating the stereotype threat increases noticeably. Girls consider themselves weaker in science, while boys consider themselves weaker in the field of language skills. This phenomenon is disturbing because it may result in wrong choices of the further path of education, not consistent with the actual competences of the students. Meanwhile, negative effects of the stereotype threat, observable in the loss of focus on the task and transferring it to dealing with fear of failure, can be reduced by various factors. The study examined the impact of creativity on eliminating the stereotype threat. The experiment in the form of a 2 (gender: male vs. female) x 3 (traditional gender roles: neutral version vs. nontraditional gender roles) x 2 (creativity: low vs. high) factorial design was conducted. The results showed that a high level of creative abilities may reduce the negative effects of stereotype threat in educational setting.

Keywords: creativity, education, language skills, mathematical skills, stereotype threat

Procedia PDF Downloads 85
1080 Analysis on Cyber Threat Actors Targeting Automated Border Security Systems

Authors: Mirko Sailio

Abstract:

Border crossing automatization reduces required human resources in handling people crossing borders. As technology replaces and augments the work done by border officers, new cyber threats arise to threaten border security. This research analyses the current cyber threat actors and their capabilities. The analysis is conducted by gathering the threat actor data from a wide range of public sources. A model for a general border automatization system is presented, and its most significant cyber-security attributes are then compared to threat actor activity and capabilities in order to predict priorities in securing such systems. Organized crime and nation-state actors present the clearest threat to border cyber-security, and additional focus is given to their motivations and activities.

Keywords: border automation, cyber-security, threat actors, border cyber-security

Procedia PDF Downloads 170
1079 Manufacturing Commercial Bricks with Construction and Demolition Wastes

Authors: Mustafa Kara, Yasemin Kilic, Bahattin Murat Demir, Ümit Ustaoglu, Cavit Unal

Abstract:

This paper reports utilization of different kind of construction and demolition wastes (C&D) in the production of bricks at industrial scale. Plastered brick waste and tile wastes were collected from ISTAÇ Co. Compost and Recovery Plant, Istanbul, Turkey. Plastered brick waste and tile waste are mixed with brick clay in the proportion of 0-30% and fired at 900ºC. The physical and mechanical properties of the produced bricks were determined and evaluated according to IKIZLER Brick Company Production values, Brick Industry Association (BIA) and Turkish Standards (TS). The resulted showed that plastered brick waste and tile waste can be used to produce good quality brick for various engineering applications in construction and building. The replacement of brick clay by plastered brick waste and tile waste at the levels of 30% has good effects on the compressive strength of the bricks.

Keywords: commercial brick, construction and demolition waste, manufacturing, recycling

Procedia PDF Downloads 320
1078 Supervised Learning for Cyber Threat Intelligence

Authors: Jihen Bennaceur, Wissem Zouaghi, Ali Mabrouk

Abstract:

The major aim of cyber threat intelligence (CTI) is to provide sophisticated knowledge about cybersecurity threats to ensure internal and external safeguards against modern cyberattacks. Inaccurate, incomplete, outdated, and invaluable threat intelligence is the main problem. Therefore, data analysis based on AI algorithms is one of the emergent solutions to overcome the threat of information-sharing issues. In this paper, we propose a supervised machine learning-based algorithm to improve threat information sharing by providing a sophisticated classification of cyber threats and data. Extensive simulations investigate the accuracy, precision, recall, f1-score, and support overall to validate the designed algorithm and to compare it with several supervised machine learning algorithms.

Keywords: threat information sharing, supervised learning, data classification, performance evaluation

Procedia PDF Downloads 114
1077 Intervention of Threat and Surveillance on the Obedience of Preschool Children

Authors: Sarah Mhae Diaz, Erika Anna De Leon, Jacklin Alwil Cartagena, Geordan Caruncong, Micah Riezl Gonzales

Abstract:

This study examined the intervention of threat and surveillance on the obedience of 100 preschool children through a task variable experiment replicated from the previous studies of Higbee (1979), and Chua, J., Chua, M., & Pico (1983). Nowadays, obedience among Filipino children to authority is disregarded since they are more outspoken and rebel due to social influences. With this, aside from corporal punishment, threat and surveillance became a mean of inducing obedience. Threat, according to the Dissonance Theory, can give attitudinal change. On the other hand, surveillance, according to the Theory of Social Facilitation, can either contribute to the completion or failure to do a task. Through a 2x2 factorial design, results show; (1) threat (F(1,96) = 12.487, p < 0.05) and (2) surveillance (F(1,96)=9.942, p<.05) had a significant main effect on obedience, suggesting that the Dissonance Theory and Theory of Social Facilitation is respectively true in the study. On the other hand, (3) no interaction (F(1,96)=1.303, p > .05) was seen since threat and surveillance both have a main effect that could be positive or negative, or could be because of their complementary property as supported by the post-hoc results. Also, (4) most effective commanding style is threat and surveillance setting (M = 30.04, SD = 7.971) due to the significant main effect of the two variables. With this, in the Filipino Setting, threat and surveillance has proven to be a very effective strategy to discipline and induce obedience from a child.

Keywords: experimental study, obedience, preschool children, surveillance, threat

Procedia PDF Downloads 464
1076 Application of the EU Commission Waste Management Methodology Level(s) to a Construction and a Demolition in North-West Romania.

Authors: Valean Maria

Abstract:

Construction and demolition waste management is a timely topic, due to the urgency of its transition to sustainability. This sector is responsible for over a third of the waste generated in the E.U., while the legislation requires a proportion of at least 70% preparation for reuse and recycle, excluding backfilling. To this end, the E.U. Commission has provided the Level(s) methodology, allowing for the standardized planning and reporting of waste quantities across all levels of the construction process, from the architecture, to the demolition, from the estimation stage, to the actual measurements at the end of the operations. We applied Level(s) for the first time to the Romanian context, a developing E.U. country in which illegal dumping of contruction waste in nature and landfills, are still common practice. We performed the desk study of the buildings’ documents, followed by field studies of the sites, and finally the insertion and calculation of statistical data of the construction and demolition waste. We learned that Romania is far from the E.U. average in terms of the initial estimations of waste, with some numbers being higher, others lower, and that the price of evacuation to landfills is significantly lower in the developing country, a possible barrier to adopting the new regulations. Finally, we found that concrete is the predominant type waste, in terms of quantity as well as cost of disposal. Further directions of research are provided, such as mapping out all of the alternative facilities in the region and the calculation of the financial costs and of the CO2 footprint, for preparing and delivering waste sustainably, for a more sound and locally adapted model of waste management.

Keywords: construction, waste, management, levels, EU

Procedia PDF Downloads 47
1075 Reduce, Reuse and Recycle: Grand Challenges in Construction Recovery Process

Authors: Abioye A. Oyenuga, Rao Bhamidiarri

Abstract:

Hurling a successful Construction and Demolition Waste (C&DW) recycling operation around the globe is a challenge today, predominantly because secondary materials markets are yet to be integrated. Reducing, Reusing and recycling of (C&DW) have been employed over the years, and various techniques have been investigated. However, the economic and environmental viability of its application seems limited. This paper discusses the costs and benefits in using secondary materials and focus on investigating reuse and recycling process for five major types of construction materials: concrete, metal, wood, cardboard/paper, and plasterboard. Data obtained from demolition specialist and contractors are considered and evaluated. With the date source, the research paper found that construction material recovery process fully incorporate the 3R’s process and shows how energy recovery by means of 3R's principles can be evaluated. This scrutiny leads to the empathy of grand challenges in construction material recovery process. Recommendations to deepen material recovery process are also discussed.

Keywords: construction and demolition waste (C&DW), 3R concept, recycling, reuse, waste management, UK

Procedia PDF Downloads 394
1074 Support of Syrian Refugees: The Roles of Descriptive and Injunctive Norms, Perception of Threat, and Negative Emotions

Authors: Senay Yitmen

Abstract:

This research investigated individual’s support and helping intentions towards Syrian refugees in Turkey. This is examined in relation to perceived threat and negative emotions, and also to the perceptions of whether one’s intimate social network (family and friends) considers Syrians a threat (descriptive network norm) and whether this network morally supports Syrian refugees (injunctive norms). A questionnaire study was conducted among Turkish participants (n= 565) and the results showed that perception of threat was associated with negative emotions which, in turn, were related to less support of Syrian refugees. Additionally, descriptive norms moderated the relationship between perceived threat and negative emotions towards Syrian refugees. Furthermore, injunctive norms moderated the relationship between negative emotions and support to Syrian refugees. Specifically, the findings indicate that perceived threat is associated with less support of Syrian refugees through negative emotions when descriptive norms are weak and injunctive norms are strong. Injunctive norms appear to trigger a dilemma over the decision to conform or not to conform: when one has negative emotions as a result of perceived threat, it becomes more difficult to conform to the moral obligation of injunctive norms which is associated with less support of Syrian refugees. Hence, these findings demonstrate that both descriptive and injunctive norms are important and play different roles in individual’s support of Syrian refugees.

Keywords: descriptive norms, emotions, injunctive norms, the perception of threat

Procedia PDF Downloads 159
1073 Cybercrime Stage Based Intervention: Through the Eyes of a Cyber Threat Actor

Authors: Jonathan W. Z. Lim, Vrizlynn L. L. Thing

Abstract:

Cybercrimes are on the rise, in part due to technological advancements, as well as increased avenues of exploitation. Sophisticated threat actors are leveraging on such advancements to execute their malicious intentions. The increase in cybercrimes is prevalent, and it seems unlikely that they can be easily eradicated. A more serious concern is that the community may come to accept the notion that this will become the trend. As such, the key question revolves around how we can reduce cybercrime in this evolving landscape. In our paper, we propose to build a systematic framework through the lens of a cyber threat actor. We explore the motivation factors behind the crimes and the crime stages of the threat actors. We then formulate intervention plans so as to discourage the act of committing malicious cyber activities and also aim to integrate ex-cyber offenders back into society.

Keywords: crime motivations, crime prevention, cybercrime, ex-cyber criminals

Procedia PDF Downloads 109
1072 Application of Directed Acyclic Graphs for Threat Identification Based on Ontologies

Authors: Arun Prabhakar

Abstract:

Threat modeling is an important activity carried out in the initial stages of the development lifecycle that helps in building proactive security measures in the product. Though there are many techniques and tools available today, one of the common challenges with the traditional methods is the lack of a systematic approach in identifying security threats. The proposed solution describes an organized model by defining ontologies that help in building patterns to enumerate threats. The concepts of graph theory are applied to build the pattern for discovering threats for any given scenario. This graph-based solution also brings in other benefits, making it a customizable and scalable model.

Keywords: directed acyclic graph, ontology, patterns, threat identification, threat modeling

Procedia PDF Downloads 110
1071 Threat Modeling Methodology for Supporting Industrial Control Systems Device Manufacturers and System Integrators

Authors: Raluca Ana Maria Viziteu, Anna Prudnikova

Abstract:

Industrial control systems (ICS) have received much attention in recent years due to the convergence of information technology (IT) and operational technology (OT) that has increased the interdependence of safety and security issues to be considered. These issues require ICS-tailored solutions. That led to the need to creation of a methodology for supporting ICS device manufacturers and system integrators in carrying out threat modeling of embedded ICS devices in a way that guarantees the quality of the identified threats and minimizes subjectivity in the threat identification process. To research, the possibility of creating such a methodology, a set of existing standards, regulations, papers, and publications related to threat modeling in the ICS sector and other sectors was reviewed to identify various existing methodologies and methods used in threat modeling. Furthermore, the most popular ones were tested in an exploratory phase on a specific PLC device. The outcome of this exploratory phase has been used as a basis for defining specific characteristics of ICS embedded devices and their deployment scenarios, identifying the factors that introduce subjectivity in the threat modeling process of such devices, and defining metrics for evaluating the minimum quality requirements of identified threats associated to the deployment of the devices in existing infrastructures. Furthermore, the threat modeling methodology was created based on the previous steps' results. The usability of the methodology was evaluated through a set of standardized threat modeling requirements and a standardized comparison method for threat modeling methodologies. The outcomes of these verification methods confirm that the methodology is effective. The full paper includes the outcome of research on different threat modeling methodologies that can be used in OT, their comparison, and the results of implementing each of them in practice on a PLC device. This research is further used to build a threat modeling methodology tailored to OT environments; a detailed description is included. Moreover, the paper includes results of the evaluation of created methodology based on a set of parameters specifically created to rate threat modeling methodologies.

Keywords: device manufacturers, embedded devices, industrial control systems, threat modeling

Procedia PDF Downloads 54
1070 Group Boundaries against and Due to Identity Threat

Authors: Anna Siegler, Sara Bigazzi, Sara Serdult, Ildiko Bokretas

Abstract:

Social identity emerging from group membership defines the representational processes of our social reality. Based on our theoretical assumption the subjective perception of identity threat leads to an instable identity structure. The need to re-establish the positive identity will lead us to strengthen group boundaries. Prejudice in our perspective offer psychological security those who thinking in exclusive barriers, and we suggest that those who identify highly with their ingroup/national identity and less with superordinate identities take distance from others and this is related to their perception of threat. In our study we used a newly developed questionnaire, the Multiple Threat and Prejudice Questionnaire (MTPQ) which measure identity threat at different dimensions of identification (national, existential, gender, religious) and the distancing of different outgroups, over and above we worked with Social Dominance Orientation (SDO) and Identification with All Humanity Scale (IWAH). We conduct one data collection (N=1482) in a Hungarian sample to examine the connection between national threat and distance-taking, and this survey includes the investigation (N=218) of identification with different group categories. Our findings confirmed that those who feel themselves threatened in their national identity aspects are less likely to identify themselves with superordinate groups and this correlation is much stronger when they think about the nation as a bio-cultural unit, while if nation defined as a social-economy entity this connection is less powerful and has just the opposite direction.

Keywords: group boundaries, identity threat, prejudice, superordinate groups

Procedia PDF Downloads 375
1069 Instrumentation of Urban Pavements Built with Construction and Demolition Waste

Authors: Sofia Figueroa, Efrain Bernal, Silvia Del Pilar Forero, Humberto Ramirez

Abstract:

This work shows a detailed review of the scope of global research on the road infrastructure using materials from Construction and Demolition Waste (C&DW), also called RCD. In the first phase of this research, a segment of road was designed using recycled materials such as Reclaimed Asphalt Pavement (RAP) on the top, the natural coarse base including 30% of RAP and recycled concrete blocks. The second part of this segment was designed using regular materials for each layer of the pavement. Both structures were built next to each other in order to analyze and measure the material properties as well as performance and environmental factors in the pavement under real traffic and weather conditions. Different monitoring devices were installed among the structure, based on the literature revision, such as soil cells, linear potentiometer, moisture sensors, and strain gauges that help us to know the C&DW as a part of the pavement structure. This research includes not only the physical characterization but also the measured parameters in a field such as an asphalt mixture (RAP) strain (ετ), vertical strain (εᵥ) and moisture control in coarse layers (%w), and the applied loads and strain in the subgrade (εᵥ). The results will show us what is happening with these materials in order to obtain not only a sustainable solution but also to know its behavior and lifecycle.

Keywords: sustainable pavements, construction & demolition waste-C&DW, recycled rigid concrete, reclaimed asphalt pavement-rap

Procedia PDF Downloads 119
1068 Analysis of Lightweight Register Hardware Threat

Authors: Yang Luo, Beibei Wang

Abstract:

In this paper, we present a design methodology of lightweight register transfer level (RTL) hardware threat implemented based on a MAX II FPGA platform. The dynamic power consumed by the toggling of the various bit of registers as well as the dynamic power consumed per unit of logic circuits were analyzed. The hardware threat was designed taking advantage of the differences in dynamic power consumed per unit of logic circuits to hide the transfer information. The experiment result shows that the register hardware threat was successfully implemented by using different dynamic power consumed per unit of logic circuits to hide the key information of DES encryption module. It needs more than 100000 sample curves to reduce the background noise by comparing the sample space when it completely meets the time alignment requirement. In additional, an external trigger signal is playing a very important role to detect the hardware threat in this experiment.

Keywords: side-channel analysis, hardware Trojan, register transfer level, dynamic power

Procedia PDF Downloads 252
1067 Evaluating Environmental Impact of End-of-Life Cycle Cases for Brick Walls and Aerated Autoclave Concrete Walls

Authors: Ann Mariya Jose, Ashfina T.

Abstract:

Construction and demolition waste is one of the rising concerns globally due to the amount of waste generated annually, the area taken up by landfills, and the adverse environmental impacts that follow. One of the primary causes of the rise in construction and demolition waste is a lack of facilities and knowledge for incorporating recycled materials into new construction. Bricks are a conventional material that has been used for construction for centuries, and Autoclave Aerated Concrete (AAC) blocks are a new emergent material in the market. This study evaluates the impact brick walls, and AAC block walls have on the environment using the tool One Click LCA, considering three End of Life (EoL) scenarios: the materials are landfilled, recycled, and reused in a new building. The final objective of the study is to evaluate the environmental impact caused by these two different walls on the environmental factors such as Global Warming Potential (GWP), Acidification Potential (AP), Eutrophication Potential (EP), Ozone Depletion Potential (ODP), and Photochemical Ozone Creation Potential (POCP). The findings revealed that the GWP caused by landfilling is 16 times higher in bricks and 22 times higher in AAC blocks when compared to the reuse of materials. The study recommends the effective use of AAC blocks in construction and reuse of the same to reduce the overall emissions to the environment.

Keywords: construction and demolition waste, environmental impact, life cycle impact assessment, material recycling

Procedia PDF Downloads 64
1066 R-Killer: An Email-Based Ransomware Protection Tool

Authors: B. Lokuketagoda, M. Weerakoon, U. Madushan, A. N. Senaratne, K. Y. Abeywardena

Abstract:

Ransomware has become a common threat in past few years and the recent threat reports show an increase of growth in Ransomware infections. Researchers have identified different variants of Ransomware families since 2015. Lack of knowledge of the user about the threat is a major concern. Ransomware detection methodologies are still growing through the industry. Email is the easiest method to send Ransomware to its victims. Uninformed users tend to click on links and attachments without much consideration assuming the emails are genuine. As a solution to this in this paper R-Killer Ransomware detection tool is introduced. Tool can be integrated with existing email services. The core detection Engine (CDE) discussed in the paper focuses on separating suspicious samples from emails and handling them until a decision is made regarding the suspicious mail. It has the capability of preventing execution of identified ransomware processes. On the other hand, Sandboxing and URL analyzing system has the capability of communication with public threat intelligence services to gather known threat intelligence. The R-Killer has its own mechanism developed in its Proactive Monitoring System (PMS) which can monitor the processes created by downloaded email attachments and identify potential Ransomware activities. R-killer is capable of gathering threat intelligence without exposing the user’s data to public threat intelligence services, hence protecting the confidentiality of user data.

Keywords: ransomware, deep learning, recurrent neural networks, email, core detection engine

Procedia PDF Downloads 179
1065 Adsorption Mechanism of Heavy Metals and Organic Pesticide on Industrial Construction and Demolition Waste and Its Runoff Behaviors

Authors: Sheng Huang, Xin Zhao, Xiaofeng Gao, Tao Zhou, Shijin Dai, Youcai Zhao

Abstract:

Adsorption of heavy metal pollutants (Zn, Cd, Pb, Cr, Cu) and organic pesticide (phorate, dithiophosphate diethyl, triethyl phosphorothioate), along with their multi-contamination on the surface of industrial construction & demolition waste (C&D waste) was investigated. Brick powder was selected as the appropriate waste while its maximum equilibrium adsorption amount of heavy metal under single controlled contamination matrix reached 5.41, 0.81, 0.45, 1.13 and 0.97 mg/g, respectively. Effects of pH and spiking dose of ICDW was also investigated. Equilibrium adsorption amount of organic pesticide varied from 0.02 to 0.97 mg/g, which was negatively correlated to the size distribution and hydrophilism. Existence of organic pesticide on surface of ICDW caused various effects on the heavy metal adsorption, mainly due to combination of metal ions and the floccule formation along with wrapping behaviors by pesticide pollutants. Adsorption of Zn was sharply decreased from 7.1 to 0.15 mg/g compared with clean ICDW and phorate contaminated ICDW, while that of Pb, Cr and Cd experienced an increase- then decrease procedure. On the other hand, runoff of pesticide contaminants was investigated under 25 mm/h simulated rainfall. Results showed that the cumulative runoff amount fitted well with curve obtained from a power function, of which r2=0.95 and 0.91 for 1DAA (1 day between contamination and runoff) and 7DAA, respectively. This study helps provide evaluation of industrial construction and demolition waste contamination into aquatic systems.

Keywords: adsorption mechanism, industrial construction waste, metals, pesticide, runoff

Procedia PDF Downloads 423
1064 The Correlation Between the Rise of China and the US-Iranian Conflict: An American Perspective

Authors: Ranj Tofik

Abstract:

This article aims to demonstrate a link and/or correlation between the rise of China and the US-Iranian conflict, from a US point of view. To demonstrate this link, the article relies on the content analysis method by analyzing American reports and official data. This article concludes that this correlation indicates that the more China rises and the greater the Chinese threat to America, the more changes will occur in the US-Iranian conflict and the US actions regarding this conflict will increase – in the form of imposing sanctions and using means of pressure on Iran, or trying to reach an agreement and settlement with Iran. This article, via noting and observing that correlation, also claims that before 2012, Iran was a regional threat to US interests in the Middle East. However, after 2012 when the rise of China became one of the major threats to America, Iran, because of its rapprochement with China, became also part of the Chinese threat, which is a threat to America's global standing. In addition, observing this correlation indicates the possibility that the rise of China and its threat to the USA has become one of the main drivers in the US-Iranian conflict. Consequently, it can be said that Iran has become a vital issue in the US-China rivalry, as it has become an appropriate gateway for China to enter the Middle East and undermine US hegemony there.

Keywords: China-Iran relations, China's rise, JCPOA, US-Chinese competition, US-Iranian conflict

Procedia PDF Downloads 55
1063 The Effects of Self-Efficacy on Challenge and Threat States

Authors: Nadine Sammy, Mark Wilson, Samuel Vine

Abstract:

The Theory of Challenge and Threat States in Athletes (TCTSA) states that self-efficacy is an antecedent of challenge and threat. These states result from conscious and unconscious evaluations of situational demands and personal resources and are represented by both cognitive and physiological markers. Challenge is considered a more adaptive stress response as it is associated with a more efficient cardiovascular profile, as well as better performance and attention effects compared with threat. Self-efficacy is proposed to influence challenge/threat because an individual’s belief that they have the skills necessary to execute the courses of action required to succeed contributes to a perception that they can cope with the demands of the situation. This study experimentally examined the effects of self-efficacy on cardiovascular responses (challenge and threat), demand and resource evaluations, performance and attention under pressurised conditions. Forty-five university students were randomly assigned to either a control (n=15), low self-efficacy (n=15) or high self-efficacy (n=15) group and completed baseline and pressurised golf putting tasks. Self-efficacy was manipulated using false feedback adapted from previous studies. Measures of self-efficacy, cardiovascular reactivity, demand and resource evaluations, task performance and attention were recorded. The high self-efficacy group displayed more favourable cardiovascular reactivity, indicative of a challenge state, compared with the low self-efficacy group. The former group also reported high resource evaluations, but no task performance or attention effects were detected. These findings demonstrate that levels of self-efficacy influence cardiovascular reactivity and perceptions of resources under pressurised conditions.

Keywords: cardiovascular, challenge, performance, threat

Procedia PDF Downloads 205
1062 A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

Authors: Li Qiang, Yang Ze-Ming, Liu Bao-Xu, Jiang Zheng-Wei

Abstract:

With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution.

Keywords: reasoning, Bayesian networks, cyber-attack attribution, Kill Chain, threat intelligence

Procedia PDF Downloads 411