Search results for: denial
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 99

Search results for: denial

69 A Polyphonic Look at Trends

Authors: Turquesa Topper

Abstract:

The reflection focuses on recording and explaining the considerations, conceptualizations and methodological approach with which from the University, that is to say, from the academic field, the study of Trends is addressed with the intention of training professionals in the area, an area that requires disciplinary boundaries and builds a polyphonic vision. When referring to the objective of our Laboratory the detection of aesthetic trends of consumption, we find ourselves in the requirement to define our object: trends, aesthetic trends of consumption, more specifically. The pages cover a conception of trends from a theoretical framework that incorporates contributions from linguistics, semiotics, sociology, cultural studies and project disciplines, in order to consolidate a polyphonic look. The text investigates in the pre-discursive aspect of the trends, in the circulation of the notion of style and in the dynamics of affirmation - denial as the constitutive dynamics of Fashion linked to any process of innovation. From such inquiry, it is presented to Fashion as a system that operates directly on the construction of socio-individual identities unfolding through the liquefaction of signs in trends.

Keywords: fashion, methodology, narrative, trends

Procedia PDF Downloads 221
68 Management and Agreement Protocol in Computer Security

Authors: Abdulameer K. Hussain

Abstract:

When dealing with a cryptographic system we note that there are many activities performed by parties of this cryptographic system and the most prominent of these activities is the process of agreement between the parties involved in the cryptographic system on how to deal and perform the cryptographic system tasks to be more secure, more confident and reliable. The most common agreement among parties is a key agreement and other types of agreements. Despite the fact that there is an attempt from some quarters to find other effective agreement methods but these methods are limited to the traditional agreements. This paper presents different parameters to perform more effectively the task of the agreement, including the key alternative, the agreement on the encryption method used and the agreement to prevent the denial of the services. To manage and achieve these goals, this method proposes the existence of an control and monitoring entity to manage these agreements by collecting different statistical information of the opinions of the authorized parties in the cryptographic system. These statistics help this entity to take the proper decision about the agreement factors. This entity is called Agreement Manager (AM).

Keywords: agreement parameters, key agreement, key exchange, security management

Procedia PDF Downloads 382
67 An Earth Mover’s Distance Algorithm Based DDoS Detection Mechanism in SDN

Authors: Yang Zhou, Kangfeng Zheng, Wei Ni, Ren Ping Liu

Abstract:

Software-defined networking (SDN) provides a solution for scalable network framework with decoupled control and data plane. However, this architecture also induces a particular distributed denial-of-service (DDoS) attack that can affect or even overwhelm the SDN network. DDoS attack detection problem has to date been mostly researched as entropy comparison problem. However, this problem lacks the utilization of SDN, and the results are not accurate. In this paper, we propose a DDoS attack detection method, which interprets DDoS detection as a signature matching problem and is formulated as Earth Mover’s Distance (EMD) model. Considering the feasibility and accuracy, we further propose to define the cost function of EMD to be a generalized Kullback-Leibler divergence. Simulation results show that our proposed method can detect DDoS attacks by comparing EMD values with the ones computed in the case without attacks. Moreover, our method can significantly increase the true positive rate of detection.

Keywords: DDoS detection, EMD, relative entropy, SDN

Procedia PDF Downloads 300
66 Lesbians, Gays and Bisexuals of Botswana: Progressive Steps by the Botswana Court of Appeal towards Recognition and Advancement of Fundamental Human Rights of the Most Vulnerable within Society

Authors: Tashwill Esterhuizen

Abstract:

Throughout Africa, several countries continue to have laws which criminalise same-sex sexual activities, which increases the vulnerability of the LGBT community to stigma, discrimination, and persecution. These criminal provisions often form the basis upon which states deny LGBT activists the right to freely associate with other like-minded individuals and form organizations that protect their interests and advocate for the rights and aspirations of the LGBT community. Over the past year, however, there has been significant progress in the advancement of universal, fundamental rights of LGBT persons throughout Africa. In many instances, these advancements came about through the bravery of activists who have publically insisted (in environments where same-sex sexual practices are criminalised) that their rights should be respected. Where meaningful engagement with the State was fruitless, activists took their plight to the judiciary and have successfully sought to uphold the fundamental rights of LGBT persons, paving the way for a more inclusive and tolerant society. Litigation Progress: Botswana is a prime example. For several years, the State denied a group of LGBT activists their right to freely associate and form their organisation Lesbians, Gays, and Bisexuals of Botswana (LEGABIBO), which aimed to promote the interests of the LGBT community in Botswana. In March 2016, the Botswana Court of Appeal found that the government’s refusal to register LEGABIBO violated the activists’ right to associate freely. The Court held that the right freedom of association applies to all persons regardless of their sexual orientation or gender identity. It does not matter that the views of the organisation are unpopular or unacceptable amongst the majority. In particular, the Court rejected the government of Botswana’s contention that registering LEGABIBO would disturb public peace and is contrary to public morality. Quite remarkably, the Court of Appeal recognised that while LGBT individuals are a minority group within the country, they are nonetheless persons entitled to constitutional protections of their dignity, regardless of whether they are unacceptable to others on religious or any other grounds. Furthermore, the Court held that human rights and fundamental freedoms are granted to all, including criminals or social outcasts because the denial of an individual’s humanity is the denial of their human dignity. This is crucial observation by the Court of Appeal, as once it is accepted that human rights apply to all human beings, then it becomes much easier for vulnerable groups to assert their own rights. Conclusion: The Botswana Court of Appeal decision, therefore, represents significant progress in the promotion of the rights of lesbian, gay, bisexual and transgender persons. The judgment has broader implications for many other countries which do not provide recognition of sexual minorities. It highlights the State’s duty to uphold basic rights and to ensure dignity, tolerance, and acceptance for marginalised persons.

Keywords: acceptance, freedom of association, freedom of expression, fundamental rights and freedoms, gender identity, human rights are universal, inclusive, inherent human dignity, progress, sexual orientation, tolerance

Procedia PDF Downloads 202
65 "Groomers, Pedos, and Perverts": Strategies for Queer People and Allies to Combat Discourses of Hate

Authors: Todd G. Morrison, C. J. Bishop, Melanie A. Morrison

Abstract:

An upsurge of hatred directed at sexual- and gender-marginalized persons (SGMPs) has been documented in numerous Western nations. The denial of gender-affirmative care for trans youth; the banning of books containing queer content (no matter how innocuous); the boycotting of products affiliated with queer influencers and with pride celebrations; and the silencing of sexual- and gender-marginalized teachers and academics (and their allies) constitute key ways in which this hatred now manifests itself. The health consequences for SGMPs living in environments characterized by hatred of queer people include elevated rates of depression, anxiety, suicidality, and substance misuse. Given these sequelae, in this paper, the authors outline the challenges that academics experience when adopting an advocacy role. The authors also provide an overview of specific strategies that SGMPs may find helpful when engaging with persons committed to harming queer people.

Keywords: queer people, resistance, minority rights, hate speech

Procedia PDF Downloads 30
64 Tracing Back the Bot Master

Authors: Sneha Leslie

Abstract:

The current situation in the cyber world is that crimes performed by Botnets are increasing and the masterminds (botmaster) are not detectable easily. The botmaster in the botnet compromises the legitimate host machines in the network and make them bots or zombies to initiate the cyber-attacks. This paper will focus on the live detection of the botmaster in the network by using the strong framework 'metasploit', when distributed denial of service (DDOS) attack is performed by the botnet. The affected victim machine will be continuously monitoring its incoming packets. Once the victim machine gets to know about the excessive count of packets from any IP, that particular IP is noted and details of the noted systems are gathered. Using the vulnerabilities present in the zombie machines (already compromised by botmaster), the victim machine will compromise them. By gaining access to the compromised systems, applications are run remotely. By analyzing the incoming packets of the zombies, the victim comes to know the address of the botmaster. This is an effective and a simple system where no specific features of communication protocol are considered.

Keywords: bonet, DDoS attack, network security, detection system, metasploit framework

Procedia PDF Downloads 222
63 Survey of Intrusion Detection Systems and Their Assessment of the Internet of Things

Authors: James Kaweesa

Abstract:

The Internet of Things (IoT) has become a critical component of modern technology, enabling the connection of numerous devices to the internet. The interconnected nature of IoT devices, along with their heterogeneous and resource-constrained nature, makes them vulnerable to various types of attacks, such as malware, denial-of-service attacks, and network scanning. Intrusion Detection Systems (IDSs) are a key mechanism for protecting IoT networks and from attacks by identifying and alerting administrators to suspicious activities. In this review, the paper will discuss the different types of IDSs available for IoT systems and evaluate their effectiveness in detecting and preventing attacks. Also, examine the various evaluation methods used to assess the performance of IDSs and the challenges associated with evaluating them in IoT environments. The review will highlight the need for effective and efficient IDSs that can cope with the unique characteristics of IoT networks, including their heterogeneity, dynamic topology, and resource constraints. The paper will conclude by indicating where further research is needed to develop IDSs that can address these challenges and effectively protect IoT systems from cyber threats.

Keywords: cyber-threats, iot, intrusion detection system, networks

Procedia PDF Downloads 49
62 Law of the River and Indigenous Water Rights: Reassessing the International Legal Frameworks for Indigenous Rights and Water Justice

Authors: Sultana Afrin Nipa

Abstract:

Life on Earth cannot thrive or survive without water. Water is intimately tied with community, culture, spirituality, identity, socio-economic progress, security, self-determination, and livelihood. Thus, access to water is a United Nations recognized human right due to its significance in these realms. However, there is often conflict between those who consider water as the spiritual and cultural value and those who consider it an economic value thus being threatened by economic development, corporate exploitation, government regulation, and increased privatization, highlighting the complex relationship between water and culture. The Colorado River basin is home to over 29 federally recognized tribal nations. To these tribes, it holds cultural, economic, and spiritual significance and often extends to deep human-to-non-human connections frequently precluded by the Westphalian regulations and settler laws. Despite the recognition of access to rivers as a fundamental human right by the United Nations, tribal communities and their water rights have been historically disregarded through inter alia, colonization, and dispossession of their resources. Law of the River such as ‘Winter’s Doctrine’, ‘Bureau of Reclamation (BOR)’ and ‘Colorado River Compact’ have shaped the water governance among the shareholders. However, tribal communities have been systematically excluded from these key agreements. While the Winter’s Doctrine acknowledged that tribes have the right to withdraw water from the rivers that pass through their reservations for self-sufficiency, the establishment of the BOR led to the construction of dams without tribal consultation, denying the ‘Winters’ regulation and violating these rights. The Colorado River Compact, which granted only 20% of the water to the tribes, diminishes the significance of international legal frameworks that prioritize indigenous self-determination and free pursuit of socio-economic and cultural development. Denial of this basic water right is the denial of the ‘recognition’ of their sovereignty and self-determination that questions the effectiveness of the international law. This review assesses the international legal frameworks concerning indigenous rights and water justice and aims to pinpoint gaps hindering the effective recognition and protection of Indigenous water rights in Colorado River Basin. This study draws on a combination of historical and qualitative data sets. The historical data encompasses the case settlements provided by the Bureau of Reclamation (BOR) respectively the notable cases of Native American water rights settlements on lower Colorado basin related to Arizona from 1979-2008. This material serves to substantiate the context of promises made to the Indigenous people and establishes connections between existing entities. The qualitative data consists of the observation of recorded meetings of the Central Arizona Project (CAP) to evaluate how the previously made promises are reflected now. The study finds a significant inconsistency in participation in the decision-making process and the lack of representation of Native American tribes in water resource management discussions. It highlights the ongoing challenges faced by the indigenous people to achieve their self-determination goal despite the legal arrangements.

Keywords: colorado river, indigenous rights, law of the river, water governance, water justice

Procedia PDF Downloads 6
61 A Blockchain-Based Protection Strategy against Social Network Phishing

Authors: Francesco Buccafurri, Celeste Romolo

Abstract:

Nowadays phishing is the most frequent starting point of cyber-attack vectors. Phishing is implemented both via email and social network messages. While a wide scientific literature exists which addresses the problem of contrasting email spam-phishing, no specific countermeasure has been so far proposed for phishing included into private messages of social network platforms. Unfortunately, the problem is severe. This paper proposes an approach against social network phishing, based on a non invasive collaborative information-sharing approach which leverages blockchain. The detection method works by filtering candidate messages, by distilling them by means of a distance-preserving hash function, and by publishing hashes over a public blockchain through a trusted smart contract (thus avoiding denial of service attacks). Phishing detection exploits social information embedded into social network profiles to identify similar messages belonging to disjoint contexts. The main contribution of the paper is to introduce a new approach to contrasting the problem of social network phishing, which, despite its severity, received little attention by both research and industry.

Keywords: phishing, social networks, information sharing, blockchain

Procedia PDF Downloads 289
60 The Impact of COVID-19 Pandemic on the Issue and Ideological Congruence of Trump and Bolsonaro Administrations

Authors: Flavio Contrera, Paulo Cesar Gregorio

Abstract:

Recent political developments and government control actions in the face of the COVID-19 pandemic draw attention to the contrast between the duties of government and the demands of democratic representation. Elected by mobilizing far-right issues, Trump and Bolsonaro moved away from the WHO guidelines but had to accommodate demands on the health and on the social protection system on the one hand and demands from the economic sector on the other. This study used the MARPOR Project method to assess the impact of the COVID-19 pandemic on the issue and ideological congruence between the electoral and governmental arena in both the Trump and Bolsonaro Administrations. Findings reveal issue congruence between arenas in "National Way of Life: Positive", "Law and Order," and "Technology and Infrastructure" for Donald Trump, and "Welfare State Expansion" for Bolsonaro. Ideological estimation results show that Trump and Bolsonaro positioned to the right in their presidential elections, initially moved to the center-right. However, welfare policies actions at high frequency during the COVID-19 pandemic moved the ideological estimations of both governments to the center-left, despite their denial rhetoric.

Keywords: congruence, COVID-19, Donald Trump, Jair Bolsonaro

Procedia PDF Downloads 201
59 Availability Strategy of Medical Information for Telemedicine Services

Authors: Rozo D. Juan Felipe, Ramírez L. Leonardo Juan, Puerta A. Gabriel Alberto

Abstract:

The telemedicine services require correct computing resource management to guarantee productivity and efficiency for medical and non-medical staff. The aim of this study was to examine web management strategies to ensure the availability of resources and services in telemedicine so as to provide medical information management with an accessible strategy. In addition, to evaluate the quality-of-service parameters, the followings were measured: delays, throughput, jitter, latency, available bandwidth, percent of access and denial of services based of web management performance map with profiles permissions and database management. Through 24 different test scenarios, the results show 100% in availability of medical information, in relation to access of medical staff to web services, and quality of service (QoS) of 99% because of network delay and performance of computer network. The findings of this study suggest that the proposed strategy of web management is an ideal solution to guarantee the availability, reliability, and accessibility of medical information. Finally, this strategy offers seven user profile used at telemedicine center of Bogota-Colombia keeping QoS parameters suitable to telemedicine services.

Keywords: availability, medical information, QoS, strategy, telemedicine

Procedia PDF Downloads 166
58 Religion and Risk: Unmasking Noah's Narratives in the Pacific Islands

Authors: A. Kolendo

Abstract:

Pacific Islands are one of the most vulnerable areas to climate change. Sea level rise and accelerating storm surge continuously threaten the communities' habitats on low-lying atolls. With scientific predictions of encroaching tides on their land, the Islanders have been informed about the need for future relocation planning. However, some communities oppose such retreat strategies through the reasoning that comprehends current climatic changes through the lenses of the biblical ark of Noah. This parable states God's promise never to flood the Earth again and never deprive people of their land and habitats. Several interpretations of this parable emerged in Oceania, prompting either climate action or denial. Resistance to relocation planning expressed through Christian thoughts led religion to be perceived as a barrier to dialogue between the Islanders and scientists. Since climate change concerns natural processes, the attitudes towards environmental stewardship prompt the communities' responses to it; some Christian teachings indicate humanity's responsibility over the environment, whereas others ascertain the people's dominion, which prompts resistance and sometimes denial. With church denominations and their various environmental standpoints, competing responses to climate change emerged in Oceania. Before miss-ionization, traditional knowledge had guided the environmental sphere, influencing current Christian teachings. Each atoll characterizes a distinctive manner of traditional knowledge; however, the unique relationship with nature unites all islands. The interconnectedness between the land, sea and people indicates the integrity between the communities and their environments. Such a factor influences the comprehension of Noah's story in the context of climate change that threatens their habitats. Pacific Islanders experience climate change through the slow disappearance of their homelands. However, the Western world perceives it as a global issue that will affect the population in the long-term perspective. Therefore, the Islanders seek to comprehend this global phenomenon in a local context that reads climate change as the Great Deluge. Accordingly, the safety measures that this parable promotes compensate for the danger of climate change. The rainbow covenant gives hope in God's promise never to flood the Earth again. At the same time, Noah's survival relates to the Islanders' current situation. Since these communities have the lowest carbon emissions rate, their contribution to anthropogenic climate change is scarce. Therefore, the lack of environmental sin would contextualize them as contemporary Noah with the ultimate survival of sea level rise. This study aims to defy religion constituting a barrier through secondary data analysis from a risk compensation perspective. Instead, religion is portrayed as a source of knowledge that enables comprehension of the communities' situation. By demonstrating that the Pacific Islanders utilize Noah's story as a vessel for coping with the danger of climate change, the study argues that religion provides safety measures that compensate for the future projections of land's disappearance. The purpose is to build a bridge between religious communities and scientific bodies and ultimately bring an understanding of two diverse perspectives. By addressing the practical challenges of interdisciplinary research with faith-based systems, this study uplifts the voices of communities and portrays their experiences expressed through Christian thoughts.

Keywords: Christianity, climate change, existential threat, Pacific Islands, story of Noah

Procedia PDF Downloads 53
57 Disagreement in Spousal Report of Current Contraceptive Use in India and Its Determinants

Authors: Dipti Govil, Nidhi Khosla

Abstract:

Couple-level reports of contraception are important as wives and husbands may give different reports about contraceptive use. Using matched couple-data (N=62910), from India's NFHS–IV (2015-16), this paper examines concordance in spousal reports of current contraceptive use and its differentials. Reporting of contraceptive use was higher among wives (59%) than husbands (25%). Concordance was low; 16.5% of couples reported the use of the same method, while 21% reported the use of any method. There existed a huge denial from husbands on the use of female sterilization. Reconstruction of contraceptive use among men increased concordance by 10%. Multivariate analysis shows that concordance was low in urban and Southern India, among younger women and women with lower wealth-index. Men's control over household decision-making and negative attitudes towards contraception were associated with a lower concordance. Findings highlight the importance of using couple-level data to estimate contraceptive prevalence, the role of education programs to inculcate positive attitudes towards contraception, fostering gender equality, and involving men into family planning efforts. The results also raise the issue of data quality as the questions were asked differently from men and women, which might have contributed to wide discordance.

Keywords: concordance, contraceptive use, couple, female sterilisation, India

Procedia PDF Downloads 96
56 Cybercrimes in Nigeria: Its Causes, Effects and Solutions

Authors: Uzoma Igboji

Abstract:

Cybercrimes involves crimes committed on the internet using the computer as a tool or targeted victim. In Nigeria today, there are many varieties of crimes that are committed on the internet daily, some are directed to the computers while the others are directed to the computer users. Cyber terrorism, identity theft, internet chat room, piracy and hacking are identified as types of cyber crimes. Usually, these crimes are perpetrated in forms of like sending of fraudulent and bogus financial proposals from cyber crimes to innocent internet users. The increasing rates of cyber crimes have become strong threats to the society, organizations and country’s reputation, E-commerce growth, denial of innocent Nigerian opportunity abroad and reduced productivity. This study identified some of the causes of cybercrimes to include urbanization, high rate of unemployment, corruption, easy accessibility to internet and weak implementation of cyber crimes in Nigeria. Therefore, internet users should inculcate the habit of continuously updating their knowledge about the ever changing ICTs through this, they can be well informed about the current trends in cybercrimes and how the cybercrimes carryout their dubious activities. Thus, how they can devise means of protecting their information from cyber criminals. Internet users should be security conscious at all times .Recommendations were proposed on how these crimes can be minimized if not completely eradicated.

Keywords: cyber-crimes, cyber-terrorism, cyber-criminals, Nigeria

Procedia PDF Downloads 496
55 The Effectiveness of the Workers' Constitutional Rights of Citizenship as One of the Embodiments of the Democratic and Social State of the Brazilian Law

Authors: Christine S. Veviani

Abstract:

By observing the Brazilian labor reality, considered as degrading and oppressive, as well as responsible for creating obstacles to rights, this paper is aimed at demonstrating the obligatoriness of complying with the Constitution, as an effective instrument of the Democratic and Social State of Law established in the country since 1988, which identifies and determines the recognition of a single type of citizenship, as representation of equality, social inclusion and human dignity. To achieve this purpose, that is, to awake to a new culture focused on human respect / fundamental rights engraved in the Brazilian Constitution, doctrinal works, case law and labor courts (how they work) will be used as methodology. Thus, by concluding that there is a need for a change in behavior, by employers, intended to respect the Constitution, especially with regard to the concept and citizenship content if an attempt is made to achieve as a result few steps effectiveness of fundamental social rights protective of the Brazilian working class. Thus, by analyzing the Brazilian labor reality, the result is the employers' denial of full and single citizenship of workers, whose effects are directly related to the violation of rights, which leads to the conclusion that there is a need for a change in the behavior regarding the respect for the Constitution, especially concerning the effectiveness of fundamental social rights, which protect the working class in Brazil.

Keywords: employment relationships, opposing citizenships, constitutionalism, capitalism

Procedia PDF Downloads 326
54 A Functional Analysis of the 2016 United States Presidential Debates through the Application of the Functional Theory of Political Campaign Discourse

Authors: Maryam Vaezi

Abstract:

In this study, the Functional Theory of Political Campaign Discourse has been applied in order to investigate the 2016 Clinton-Trump presidential debates. All three kinds of utterances (acclaims, attacks, and defenses) were produced by the candidates supporting the usefulness of the Functional Theory of Political Campaign Discourse for the analysis of the presidential debates as a type of political discourse. Attacks comprised 45% of the candidates’ utterances, followed by acclaims at 33%; defenses were the least common function at 22%. The candidate from the Democratic Party, Hillary Clinton, acclaimed more, whereas the Republican Party presidential candidate, Donald Trump, attacked more. Simple denial was the most common form of defense used by the candidates. Both candidates directed more of their utterances to policy (past deeds, future plans, and general goals) than character (personal qualities, leadership abilities, and ideals). Analyzing debates in terms of the functions performed by the candidates to increase their desirability and chance of winning the election, can lead to a better understanding of these significant political events as well as other forms of political discourse.

Keywords: acclaim, attack, defend, character, Democratic Party, Donald Trump, Hillary Clinton, policy, presidential debates, Republican Party

Procedia PDF Downloads 296
53 Basics of SCADA Security: A Technical Approach

Authors: Michał Witas

Abstract:

This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.

Keywords: denial of service, SCADA, security policy, distributed network

Procedia PDF Downloads 340
52 Theoretical Approach and Proof of Concept Implementation of Adaptive Partition Scheduling Module for Linux

Authors: Desislav Andreev, Veselin Stanev

Abstract:

Linux operating system continues to gain popularity with every passed year. This is due to its open-source license and a great number of distributions, covering users’ needs. At first glance it seems that Linux can be integrated in every type of systems – it is already present in personal computers, smartphones and even in some embedded systems like Raspberry Pi. However, Linux still does not meet the performance and security requirements to run effectively on a real-time system. Real-time systems are very time-restricted – their processes have to execute and finish at strict time intervals. The Completely Fair Scheduler present in Linux does not have such scheduling capabilities and it is not able to ensure that critical-time processes will execute on time. One of the ways to solve this problem is implementing an Adaptive Partition Scheduler solution similar to that present in QNX Neutrino operating system. This type of scheduling divides the CPU in multiple adaptive partitions where each partition holds a percentage of CPU usage called budget, which allows optimal usage of the CPU resources and also provides protection against cyber attacks such as Denial of Service. This approach will also benefit systems, where functional safety is highly demanded, such as the instrumental clusters in the Automotive industry. The purpose of this paper is to present a concept of Adaptive Partition Scheduler designed for Linux-based operating systems.

Keywords: adaptive partitions, Linux kernel modules, real-time systems, scheduling

Procedia PDF Downloads 68
51 Static Analysis of Security Issues of the Python Packages Ecosystem

Authors: Adam Gorine, Faten Spondon

Abstract:

Python is considered the most popular programming language and offers its own ecosystem for archiving and maintaining open-source software packages. This system is called the python package index (PyPI), the repository of this programming language. Unfortunately, one-third of these software packages have vulnerabilities that allow attackers to execute code automatically when a vulnerable or malicious package is installed. This paper contributes to large-scale empirical studies investigating security issues in the python ecosystem by evaluating package vulnerabilities. These provide a series of implications that can help the security of software ecosystems by improving the process of discovering, fixing, and managing package vulnerabilities. The vulnerable dataset is generated using the NVD, the national vulnerability database, and the Snyk vulnerability dataset. In addition, we evaluated 807 vulnerability reports in the NVD and 3900 publicly known security vulnerabilities in Python Package Manager (pip) from the Snyk database from 2002 to 2022. As a result, many Python vulnerabilities appear in high severity, followed by medium severity. The most problematic areas have been improper input validation and denial of service attacks. A hybrid scanning tool that combines the three scanners bandit, snyk and dlint, which provide a clear report of the code vulnerability, is also described.

Keywords: Python vulnerabilities, bandit, Snyk, Dlint, Python package index, ecosystem, static analysis, malicious attacks

Procedia PDF Downloads 94
50 ANOVA-Based Feature Selection and Machine Learning System for IoT Anomaly Detection

Authors: Muhammad Ali

Abstract:

Cyber-attacks and anomaly detection on the Internet of Things (IoT) infrastructure is emerging concern in the domain of data-driven intrusion. Rapidly increasing IoT risk is now making headlines around the world. denial of service, malicious control, data type probing, malicious operation, DDos, scan, spying, and wrong setup are attacks and anomalies that can affect an IoT system failure. Everyone talks about cyber security, connectivity, smart devices, and real-time data extraction. IoT devices expose a wide variety of new cyber security attack vectors in network traffic. For further than IoT development, and mainly for smart and IoT applications, there is a necessity for intelligent processing and analysis of data. So, our approach is too secure. We train several machine learning models that have been compared to accurately predicting attacks and anomalies on IoT systems, considering IoT applications, with ANOVA-based feature selection with fewer prediction models to evaluate network traffic to help prevent IoT devices. The machine learning (ML) algorithms that have been used here are KNN, SVM, NB, D.T., and R.F., with the most satisfactory test accuracy with fast detection. The evaluation of ML metrics includes precision, recall, F1 score, FPR, NPV, G.M., MCC, and AUC & ROC. The Random Forest algorithm achieved the best results with less prediction time, with an accuracy of 99.98%.

Keywords: machine learning, analysis of variance, Internet of Thing, network security, intrusion detection

Procedia PDF Downloads 90
49 Impact of Socio-Cultural Attributes of Imo Communities on Widowhood Practice in Imo State, Nigeria

Authors: Otuu O. Obasi, Jude C. Ajaraogu, Happiness C. Anthony-Ikpe

Abstract:

Women in Igbo land generally experience culture-related mistreatment in the event of the death of their husbands. The mistreatment ranges from scraping of widows’ hair to denial of the right to see their husbands’ corpses. The objectives of the study were to determine the forms and prevalence of widowhood practice in the studied communities, the effects of the socio-cultural attributes of the people on the practice, and the perceived effect of the practice on the victims. Data for the study were collected from 64 randomly selected communities out of 640 communities in Imo State, Nigeria. 450 copies of the researcher-made-questionnaire were distributed across the three senatorial zones of the State. A total of 418 or 92.8% were completely filled and returned. The result of the study showed, among other things, that the majority of males and females recognized widowhood practice as dehumanizing, but opined that it cannot be stopped because it is rooted in culture. However, 30.2% of the female population did not agree that the practice is dehumanizing to women since it was their cultural practice. The study also revealed that scrapping of widows’ hair was the commonest practice while sleeping alone with the husband’s corpse was the least practice. Regarding the effect which this practice has on widows, emotional trauma topped the list; and was followed by economic hardship and health deterioration. Also shown by the study was that the level of education and religion did not have a notable effect on widowhood practice. With regard to possible stoppage measures, greater number of the respondents (38%) indicated that a synergy of efforts was needed to curb the social scourge.

Keywords: widowhood practice, socio-cultural attributes, violence, impact

Procedia PDF Downloads 100
48 From a Madwoman in the Attic to a Fairy Land: A Conversation with Antoinette in Jean Rhys's Wide Sargasso Sea

Authors: Prasenjit Panda

Abstract:

Jean Rhys’s Wide Sargasso Sea, a prequel to Bronte’s Jane Eyre, explores the history of the other and gives voices to the people who were silenced and kept under the darkness of negation and denial for a long time. Jean Wide Sargasso Sea provides an alternative understanding of Charlotte Brontë’s mad Creole woman, i.e., Bertha Mason of Jane Eyre in the postcolonial context. Rhys transforms Charlotte Bronte’s Victorian romance into a realistic narrative. In doing so, she re-reads Bertha as Antoinette, the unspeakable figure of otherness, into an unnameable self, and creates a new stage for the inner self. She in the novel is no longer a lunatic heiress in Rochester’s attic rather in this novel she finds her fantasy, dream and most importantly, voice. Rhys peeps through the character of Antoinette through her fragmented memories, dreams, and identity. Antoinette’s identity is mutilated constantly in the conflicts between colonizers and colonized, male and female, black and white. We shall use postcolonial theories like Bhaba’s hybridity and third space as a methodology to reveal the dialectics of struggle of a doubly colonized woman.We shall see that Bertha Mason was neglected by Bronte because of her madness and was locked in the Rochester’s Attic, but here Rhys beautifully converts her madness as a language of Antoinette, a language for her protest, a language for her liberation, a language for her dreams. In this present paper, we shall try to show how Antoinette tries to free her soul and body from the clutches of her multiple existences, identity, and narratives.

Keywords: colonizer, dislocation, fragmented memories, identity, narratives

Procedia PDF Downloads 239
47 Comparative Analysis of the Psychosocial Impact of Skin Diseases in India

Authors: Priyanka Jain, Sushila Pareek

Abstract:

Skin disease is often considered to be ‘only cosmetic’ by many medical professionals and lay-people alike but unlike most internal illnesses, skin disease is often immediately visible to others and therefore people suffering from dermatological conditions may suffer serious social and emotional consequences. The purpose of this research was to compare patients suffering from acne, alopecia areata (AA) and melanosis on perceived stress, social appearance anxiety and coping. The study included 120 patients (acne = 40 AA = 40 melanosis = 40) ages ranged from 15 to 25 years. Perceived Stress Scale (PSS), Social Appearance Anxiety Scale (SAAS), and The Brief COPE were administered to the patients. Analytical evaluation was done by Kruskal Wallis and ANOVA-tests. The results of the present study clearly revealed that perceived stress and social appearance anxiety were highest in patients with AA followed by acne patients and found least in patients with melanosis. With regard to coping, self-distraction as a coping technique was found highest in patients suffering from AA followed by acne and then melanosis. Denial was highest in acne patients followed by AA and experienced least by patients with melanosis. Behavioural disengagement was almost equal in patients with melanosis and acne and a little less in patients suffering from AA Acceptance was highest in patients with melanosis, followed by AA and least in acne patients. Self-blame was found highest in patients with acne, followed by AA patients further followed by patients suffering from melanosis. This study is an attempt to stimulate professionals working in the field of dermatology and mental health to explore their supportive communication and increase awareness regarding the difficulties that patients with skin disease can face.

Keywords: coping, dermatology, perceived stress, psychosocial impact, social appearance anxiety

Procedia PDF Downloads 436
46 Identification of Flooding Attack (Zero Day Attack) at Application Layer Using Mathematical Model and Detection Using Correlations

Authors: Hamsini Pulugurtha, V.S. Lakshmi Jagadmaba Paluri

Abstract:

Distributed denial of service attack (DDoS) is one altogether the top-rated cyber threats presently. It runs down the victim server resources like a system of measurement and buffer size by obstructing the server to supply resources to legitimate shoppers. Throughout this text, we tend to tend to propose a mathematical model of DDoS attack; we discuss its relevancy to the choices like inter-arrival time or rate of arrival of the assault customers accessing the server. We tend to tend to further analyze the attack model in context to the exhausting system of measurement and buffer size of the victim server. The projected technique uses an associate in nursing unattended learning technique, self-organizing map, to make the clusters of identical choices. Lastly, the abstract applies mathematical correlation and so the standard likelihood distribution on the clusters and analyses their behaviors to look at a DDoS attack. These systems not exclusively interconnect very little devices exchanging personal data, but to boot essential infrastructures news standing of nuclear facilities. Although this interconnection brings many edges and blessings, it to boot creates new vulnerabilities and threats which might be conversant in mount attacks. In such sophisticated interconnected systems, the power to look at attacks as early as accomplishable is of paramount importance.

Keywords: application attack, bandwidth, buffer correlation, DDoS distribution flooding intrusion layer, normal prevention probability size

Procedia PDF Downloads 187
45 Multi-Dimension Threat Situation Assessment Based on Network Security Attributes

Authors: Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv

Abstract:

As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.

Keywords: DDoS evaluation, improved CVSS, network security attribute, threat situation assessment

Procedia PDF Downloads 180
44 The Investigation on the Role of Colonial Judges in Protecting the Rights of Muslim Women to Dower and Divorce in British India: From the Period between 1800-1939

Authors: Sunil Tirkey

Abstract:

The colonial court records between 1800 to 1939 in India show the existence of excessive dower, which were usually paid at the dissolution of marriage to discourage divorce. Supporting this view of excessive dower as a useful device, Mitra Sharafi (legal historian of modern South Asia) argues that inflated dower and divorce law protected Muslim women against instant divorce, making it too expensive for husbands to use it. Further, according to her, British judges enhanced women’s rights to dower and divorce by pronouncing rulings in favour of a high amount of dower to protect the women against the one-sided authority of men to divorce. Contrary to the view of Sharafi, this paper will argue that inflated dower did not protect the rights of women against instant divorce and undesirable marriage, and British judges did not really work to better the lives of Muslim women. To prove so, we shall firstly argue from the court cases that it was challenging for women to prove divorce on the husbands’ denial of divorce in order to avoid the payment of dower. Secondly, it was almost impossible for women to get rid of their undesirable marriage, as divorce was impartially dependent on their husbands. Thirdly, Muslim women were often deprived of their unpaid prompt dower due to the rigorous application of colonial law of limitation by British judges. Furthermore, the abolition of the office of Muslim legal experts from the colonial courts in 1864 deprived Muslim women not only to avail the interpretation of Islamic law but to benefit from the diversity and flexibility of Islamic law in obtaining their right to dower and divorce.

Keywords: courts, divorce, inflated dower, Islamic law, women’s rights

Procedia PDF Downloads 91
43 Discrimination Faced by Dalit Women in India

Authors: Soundarya Lahari Vedula

Abstract:

Dalit women make up a significant portion of the Indian population. However, they are victims of age old discrimination. This paper presents a brief background of the Indian caste system which is a hierarchical division placing Dalits at the lowest rank. Dalits are forced to perform menial and harsh tasks. They often face social ostracism. The situation of Dalit women is of unique significance as they face triple discrimination due to their caste, gender, and class. Dalit women are strictly withheld by the rigid boundaries of the caste system. They are discriminated at every stage of their life and are denied access to public places, education and healthcare facilities among others. They face the worst forms of sexual violence. In spite of legislations and international conventions in place, their plight is not adequately addressed. This paper discusses, in brief, the legal mechanism in place to prohibit untouchability. Furthermore, this paper details on the specific human rights violations faced by Dalit women in the social, economic and political spheres. The violations range from discrimination in public places, denial of education and health services, sexual exploitation and barriers to political representation. Finally, this paper identifies certain lacunae in the existing Indian statutes and broadens on the measures to be taken to improve the situation of Dalit women. This paper offers some recommendations to address the plight of Dalit women such as amendments to the existing statutes, effective implementation of legal mechanisms and a more meaningful interpretation of the international conventions.

Keywords: Dalit, caste, class, discrimination, equality

Procedia PDF Downloads 168
42 Winning the “Culture War”: Greater Hungary and the American Confederacy as Sites of Nostalgia, Mythology, and Problem-Making for the Far Right in the US and Hungary

Authors: Grace Rademacher

Abstract:

Trauma” of the Kingdom of Hungary and the “Lost Cause” of the American Confederacy. Applying Nicole Maurantonio’s articulation of “confederate exceptionalism” and Svetlana Boym’s definition of “restorative nostalgia”, this article argues that, via memorialization and public discourse, both far right bodies flood their constituencies with narratives of nostalgia and martyrdom to sow existential anxieties about past and prophetic victimhood, all under the guise of protecting or restoring heritage. Linking this practice to gamification and conspiracy theorizing and following the work of Patrick Jagoda, this article identifies such industries of nostalgia as means by which the far right in both nations can partake in the “immanent and improvisational process of problem making.” Reified through monuments and references to the Trianon Trauma and the American confederacy, political actors “problem make” by alleging that they are victims of the West or the Left, subject to the cruel whims of liberalism and denial of historical legitimacy. In both nations, relying on their victimhood, pundits and politicians can appeal to white supremacists and distract citizens from legitimate active conflicts, such as wars or democratic rollbacks, redirecting them to fictional, mythical attacks on Hungarian or American society and civilization. This article will examine memorials and monuments as “lieux de memoire” and identify the purposeful similarities between the discourse of public figures and politicians such as María Schmidt, János Lázár, and Viktor Orbán, with that of Donald Trump and pundits such as Tucker Carlson.

Keywords: nationalism, political memory, white supremacy, trianon

Procedia PDF Downloads 48
41 Managing Organizational Change for a Transformation Project: The Billing and Customer Relationship Management Journey

Authors: Sharifah I. N. A. Syed Azmi, Nazarina Mohd Nasir

Abstract:

The Billing & Customer Relationship Management (BCRM) project is an important enabler towards realizing customer experience transformation. It involves technological shifts for future scalability, revision of multiple business processes and adoption of change by the users and impacted employees. This massive transition, if not managed properly, may result in the decline of business performance due to productivity drop. Organizational change management is an essential element in BCRM project implementation to ensure the system is well understood and embraced by all stakeholders. In order to move impacted employees from unaware state or denial mode to full-acceptance mindset and committing themselves in using the new system, their involvement in the whole change process starting from the initial stage is imperative. Through the BCRM Change Management Plan, a holistic approach was taken whereby the strategy and program for five key components namely executive sponsorship, continuous communication, process change readiness, organizational readiness and individual readiness were all carefully established. Roles of the project sponsor, change agents, change ambassadors and community of practice (CoP) were clearly defined in gaining high commitment and support across the entire organization. Continuous communication and engagement initiatives throughout project implementation have been carried out to reach all stakeholders. The business readiness was constantly monitored and assessed including effectiveness of end-user training, thorough review of process documentation and completion of roles realignment exercise.

Keywords: BCRM, change management, organizational change, transformation project

Procedia PDF Downloads 107
40 A Discourse Analysis of Menopause for Thai Women

Authors: Prapaipan Phingchim

Abstract:

The number of women approaching menopausal age in Thailand is increasing, making menopause an important health topic. In order to understand Thai women's different ways of interpreting menopausal experiences and the way they construct meaning relating to menopause, it is necessary to include the context in which meaning is constructed as well as the background of cultural attitudes to menopause existing in the Thai society. The aim of this study was to describe different discourses on menopause in Thailand that present themselves to menopausal women through the use of language and to analyze linguistic strategies used to represent such identity. This study adopts discourse theory and a close pragmatic analysis to examine the discursive construction of menopause for Thai women. Two hundreds and fifteen pieces of text under the heading or subject of `menopause' or `becoming a middle-aged woman', published from 2010 to 2019, were included. All material was addressed to Thai women, and consisted of booklets and informational material, articles from newspapers and magazines and popular science books. Five different discourses on menopause were identified: the biomedical discourse; the health-promotion discourse; the consumer discourse; the alternative discourse; and the feminist/ critical discourse. The biomedical discourse on menopause was found to be dominant, but was expanded or challenged by other discourses by offering different scopes of action and/or resting on different fundamental values. The discourses constructed and positioned individual women differently; thus, the women's position varied noticeably from one discourse to another. There are seven major linguistic strategies used to construct those identities. That is, lexical selection, presupposition manipulation, presupposition denial, the use of implication, the use of passive construction, using the cause and effect sentence structure, and rhetoric questions.

Keywords: discourse analysis, discursive construction, menopause, Thai women

Procedia PDF Downloads 109