Search results for: protecting
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 445

Search results for: protecting

355 Motivating Factors to Use Electric Vehicles Based on Behavioral Intention Model in South Korea

Authors: Seyedsamad Tahani, Samira Ghorbanpour

Abstract:

The global warming crisis forced humans to consider their place in the world and the earth's future. In this regard, Electric Vehicles (EVs) are a significant step toward protecting the environment. By identifying factors that influence people's behavior intentions toward using Electric Vehicles (EV), we proposed a theoretical model by extending the Technology Acceptance Model (TAM), including three more concepts, Subjective Norm (SN), Self-Efficacy (SE), and Perceived Behavior Control (PBC). The study was conducted in South Korea, and a random sample was taken at a specific time. In order to collect data, a questionnaire was created in a Google Form and sent via Kakao Talk, a popular social media application used in Korea. There were about 220 participants in this survey. However, 201 surveys were completely done. The findings revealed that all factors in the TAM model and the other added concepts such as subjective norms, self-efficacy and perceived behavior control significantly affect the behavioral intention of using EVs.

Keywords: electric vehicles, behavioral intention, perceived trust, perceived enjoyment, self-efficacy

Procedia PDF Downloads 97
354 An Industrial Wastewater Management Using Cloud Based IoT System

Authors: Kaarthik K., Harshini S., Karthika M., Kripanandhini T.

Abstract:

Water is an essential part of living organisms. Major water pollution is caused due to contamination of industrial wastewater in the river. The most important step in bringing wastewater contaminants down to levels that are safe for nature is wastewater treatment. The contamination of river water harms both humans who consume it and the aquatic life that lives there. We introduce a new cloud-based industrial IoT paradigm in this work for real-time control and monitoring of wastewater. The proposed system prevents prohibited entry of industrial wastewater into the plant by monitoring temperature, hydrogen power (pH), CO₂ and turbidity factors from the wastewater input that the wastewater treatment facility will process. Real-time sensor values are collected and uploaded to the cloud by the system using an IoT Wi-Fi Module. By doing so, we can prevent the contamination of industrial wastewater entering the river earlier, and the necessary actions will be taken by the users. The proposed system's results are 90% efficient, preventing water pollution due to industry and protecting human lives.

Keywords: sensors, pH, CO₂, temperature, turbidity

Procedia PDF Downloads 79
353 Design and Analysis of Shielding Magnetic Field for Active Space Radiation Protection

Authors: Chaoyan Huang, Hongxia Zheng

Abstract:

For deep space exploration and long duration interplanetary manned missions, protection of astronauts from cosmic radiation is an unavoidable problem. However, passive shielding can be little effective for protecting particles which energies are greater than 1GeV/nucleon. In this study, active magnetic protection method is adopted. Taking into account the structure and size of the end-cap, eight shielding magnetic field configurations are designed based on the Hoffman configuration. The shielding effect of shielding magnetic field structure, intensity B and thickness L on H particles with 2GeV energy is compared by test particle simulation. The result shows that the shielding effect is better with the linear type magnetic field structure in the end-cap region. Furthermore, two magnetic field configurations with better shielding effect are investigated through H and He galactic cosmic spectra. And the shielding effect of the linear type configuration adopted in the barrel and end-cap regions is best.

Keywords: galactic cosmic rays, active protection, shielding magnetic field configuration, shielding effect

Procedia PDF Downloads 107
352 Islam, Tolerance and Anti-Terrorism: A Critical Assessment with Reference to the Royal 'Amman Message'

Authors: Adnan M. Al Assaf

Abstract:

This research project aims to assess the methods of enhancing tolerant thinking and behavior among Muslim societies. This is in addition to spreading the anti-terrorist approach in their communities. The critical assessment for the Islamic major texts in question is the selected way for convincing, as Muslims adopt these sources as the authentic references for their lives and cultures. Moreover, this research devotes a special room to the analysis of the royal ‘Amman Message’ as a contemporary Islamic approach for enhancing tolerance and anti-terrorism from an Islamic perspective. The paper includes the study of the related concepts, texts, practical applications, with some reference to the history of Islam in human interaction, accepting the others, mercy with minorities, protecting human rights. Furthermore, it assesses the methods of enhancing tolerance and minimizing the terrorist thinking and behavior practically, in the view of Amman message, as well.

Keywords: Islam, tolerance, anti-terrorism, coexistence, Amman Message

Procedia PDF Downloads 432
351 Users’ Information Disclosure Determinants in Social Networking Sites: A Systematic Literature Review

Authors: Wajdan Al Malwi, Karen Renaud, Lewis Mackenzie

Abstract:

The privacy paradox describes a phenomenon whereby there is no connection between stated privacy concerns and privacy behaviours. We need to understand the underlying reasons for this paradox if we are to help users to preserve their privacy more effectively. In particular, the Social Networking System (SNS) domain offers a rich area of investigation due to the risks of unwise information disclosure decisions. Our study thus aims to untangle the complicated nature and underlying mechanisms of online privacy-related decisions in SNSs. In this paper, we report on the findings of a Systematic Literature Review (SLR) that revealed a number of factors that are likely to influence online privacy decisions. Our deductive analysis approach was informed by Communicative Privacy Management (CPM) theory. We uncovered a lack of clarity around privacy attitudes and their link to behaviours, which makes it challenging to design privacy-protecting SNS platforms and to craft legislation to ensure that users’ privacy is preserved.

Keywords: privacy paradox, self-disclosure, privacy attitude, privacy behavior, social networking sites

Procedia PDF Downloads 130
350 A Socio-Technical Approach to Cyber-Risk Assessment

Authors: Kitty Kioskli, Nineta Polemi

Abstract:

Evaluating the levels of cyber-security risks within an enterprise is most important in protecting its information system, services and all its digital assets against security incidents (e.g. accidents, malicious acts, massive cyber-attacks). The existing risk assessment methodologies (e.g. eBIOS, OCTAVE, CRAMM, NIST-800) adopt a technical approach considering as attack factors only the capability, intention and target of the attacker, and not paying attention to the attacker’s psychological profile and personality traits. In this paper, a socio-technical approach is proposed in cyber risk assessment, in order to achieve more realistic risk estimates by considering the personality traits of the attackers. In particular, based upon principles from investigative psychology and behavioural science, a multi-dimensional, extended, quantifiable model for an attacker’s profile is developed, which becomes an additional factor in the cyber risk level calculation.

Keywords: attacker, behavioural models, cyber risk assessment, cybersecurity, human factors, investigative psychology, ISO27001, ISO27005

Procedia PDF Downloads 129
349 Capital Punishment: A Paradoxical Wrinkle to the Principles of Ethics and Morality

Authors: Pranav Vaidya

Abstract:

The recent upheaval of a ballot initiative taken place in California & Los Angeles‘s newspapers shows how the concept of giving Death Penalty obliterates the very soul basis of community and society which rests upon the tripod of values, ethics, and morality. This paper goes on with examining how, by giving death penalties we are, on one hand trying to wipe out those heinous offenders committing such unspeakable crimes against the public; while on the other hand it comes with a devastating effect of corroding and eluding the existence of ethics and morality which is in the very nature of “protecting the life of humankind”. As it can be stated that, by giving capital punishment, we are trying to legitimize an irreversible act of violence by the authority of state and target innocent victims because as long as the human justice is fallible, the risk of executing an innocent can never be eliminated. However, scholars in the legalization of Capital Punishment have argued that the courts should impose punishment befitting the crime so that they could reflect public abhorrence of the crime, create deterrent or rehabilitating effects & deliver the truest form of justice.

Keywords: ethics, heinous offenders, morality, unspeakable crimes

Procedia PDF Downloads 258
348 Countering Terrorism and Defending Human Right after 9/11: The European Perspective

Authors: Anita Blagojević

Abstract:

It is well known that the terrorist attacks on the New York City and Washington, D.C. prompted unprecedented international action to enhance international cooperation in the prevention and suppression of terrorism. In the months (and years) after September 11, the world community focused on two main efforts: first, on efforts to bring those responsible for terrorist attacks to justice, and second, on efforts to prevent future terrorist attacks. In that sense, many governments took advantage of these efforts to strengthen their national security. In that process, however, human rights and civil liberties of certain groups of people were alleged. As a consequence, part of the price paid for protecting national security against terrorist attacks was the threat of infringement on people's fundamental rights and freedoms. The aim of this paper is to analyze the role of the European Union and the Council of Europe in finding the answer to the one of the main security dilemma for the present era: how to find the balance between the protection of national security and guarantee of the people's rights and fundamental freedoms?

Keywords: terrorism, antiterrorism, European Union, Council of Europe, human rights

Procedia PDF Downloads 348
347 Improved Processing Speed for Text Watermarking Algorithm in Color Images

Authors: Hamza A. Al-Sewadi, Akram N. A. Aldakari

Abstract:

Copyright protection and ownership proof of digital multimedia are achieved nowadays by digital watermarking techniques. A text watermarking algorithm for protecting the property rights and ownership judgment of color images is proposed in this paper. Embedding is achieved by inserting texts elements randomly into the color image as noise. The YIQ image processing model is found to be faster than other image processing methods, and hence, it is adopted for the embedding process. An optional choice of encrypting the text watermark before embedding is also suggested (in case required by some applications), where, the text can is encrypted using any enciphering technique adding more difficulty to hackers. Experiments resulted in embedding speed improvement of more than double the speed of other considered systems (such as least significant bit method, and separate color code methods), and a fairly acceptable level of peak signal to noise ratio (PSNR) with low mean square error values for watermarking purposes.

Keywords: steganography, watermarking, time complexity measurements, private keys

Procedia PDF Downloads 119
346 Planning and Implementing Large-Scale Ecological Connectivity: A Review of Past and Ongoing Practices in Turkey

Authors: Tutku Ak, A. Esra Cengiz, Çiğdem Ayhan Kaptan

Abstract:

The conservation community has been increasingly promoting the concept of ecological connectivity towards the prevention and mitigation of landscape fragmentation. Many tools have been proposed for this purpose in not only Europe, but also around the world. Spatial planning for building connectivity, however, has many problems associated with the complexity of ecological processes at spatial and temporal scales. Furthermore, on the ground implementation could be very difficult potentially leading to ecologically disastrous results and waste of resources. These problems, on the other hand, can be avoided or rectified as more experience is gained with implementation. Therefore, it is the objective of this study to document the experiences gained with connectivity planning in Turkish landscapes. This paper is a preliminary review of the conservation initiatives and projects aimed at protecting and building ecological connectivity in and around Turkey. The objective is to scope existing conservation plans, tools and implementation approaches in Turkey and the ultimate goal is to understand to what degree they have been implemented and what are the constraints and opportunities that are being faced.

Keywords: ecological connectivity, large-scale landscapes, planning and implementation, Turkey

Procedia PDF Downloads 469
345 A Multi Agent Based Protection Scheme for Smart Distribution Network in Presence of Distributed Energy Resources

Authors: M. R. Ebrahimi, B. Mahdaviani

Abstract:

Conventional electric distribution systems are radial in nature, supplied at one end through a main source. These networks generally have a simple protection system usually implemented using fuses, re-closers, and over-current relays. Recently, great attention has been paid to applying Distributed energy resources (DERs) throughout electric distribution systems. Presence of such generation in a network leads to losing coordination of protection devices. Therefore, it is desired to develop an algorithm which is capable of protecting distribution systems that include DER. On the other hand smart grid brings opportunities to the power system. Fast advancement in communication and measurement techniques accelerates the development of multi agent system (MAS). So in this paper, a new approach for the protection of distribution networks in the presence of DERs is presented base on MAS. The proposed scheme has been implemented on a sample 27-bus distribution network.

Keywords: distributed energy resource, distribution network, protection, smart grid, multi agent system

Procedia PDF Downloads 573
344 Survey of Intrusion Detection Systems and Their Assessment of the Internet of Things

Authors: James Kaweesa

Abstract:

The Internet of Things (IoT) has become a critical component of modern technology, enabling the connection of numerous devices to the internet. The interconnected nature of IoT devices, along with their heterogeneous and resource-constrained nature, makes them vulnerable to various types of attacks, such as malware, denial-of-service attacks, and network scanning. Intrusion Detection Systems (IDSs) are a key mechanism for protecting IoT networks and from attacks by identifying and alerting administrators to suspicious activities. In this review, the paper will discuss the different types of IDSs available for IoT systems and evaluate their effectiveness in detecting and preventing attacks. Also, examine the various evaluation methods used to assess the performance of IDSs and the challenges associated with evaluating them in IoT environments. The review will highlight the need for effective and efficient IDSs that can cope with the unique characteristics of IoT networks, including their heterogeneity, dynamic topology, and resource constraints. The paper will conclude by indicating where further research is needed to develop IDSs that can address these challenges and effectively protect IoT systems from cyber threats.

Keywords: cyber-threats, iot, intrusion detection system, networks

Procedia PDF Downloads 52
343 The Proactive Approach of Digital Forensics Methodology against Targeted Attack Malware

Authors: Mohamed Fadzlee Sulaiman, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin

Abstract:

Each individual organization has their own mechanism to build up cyber defense capability in protecting their information infrastructures from data breaches and cyber espionage. But, we can not deny the possibility of failing to detect and stop cyber attacks especially for those targeting credential information and intellectual property (IP). In this paper, we would like to share the modern approach of effective digital forensic methodology in order to identify the artifacts in tracing the trails of evidence while mitigating the infection from the target machine/s. This proposed approach will suit the digital forensic investigation to be conducted while resuming the business critical operation after mitigating the infection and minimizing the risk from the identified attack to transpire. Therefore, traditional digital forensics methodology has to be improvised to be proactive which not only focusing to discover the root caused and the threat actor but to develop the relevant mitigation plan in order to prevent from the same attack.

Keywords: digital forensic, detection, eradication, targeted attack, malware

Procedia PDF Downloads 244
342 Linear Semi Active Controller of Magneto-Rheological Damper for Seismic Vibration Attenuation

Authors: Zizouni Khaled, Fali Leyla, Sadek Younes, Bousserhane Ismail Khalil

Abstract:

In structural vibration caused principally by an earthquake excitation, the most vibration’s attenuation system used recently is the semi active control with a Magneto Rheological Damper device. This control was a subject of many researches and works in the last years. The big challenges of searchers in this case is to propose an adequate controller with a robust algorithm of current or tension adjustment. In this present paper, a linear controller is proposed to control the MR damper using to reduce a vibrations of three story structure exposed to El Centro’s 1940 and Boumerdès 2003 earthquakes. In this example, the MR damper is installed in the first floor of the structure. The numerical simulations results of the proposed linear control with a feedback law based on clipped optimal algorithm showed the feasibility of the semi active control to protecting civil structures. The comparison of the controlled structure and uncontrolled structures responses illustrate clearly the performance and the effectiveness of the simple proposed approach.

Keywords: MR damper, seismic vibration, semi-active control

Procedia PDF Downloads 257
341 Experimental Measurements for the Effect of Dilution Procedure in Blood Esterases as Animals Biomarker for Exposure to Organophosphate Compounds

Authors: Kasim Sakran Abass

Abstract:

This main aim of this study was to confirm and extend our current knowledge about the effects of dilutions on esterases activities in the blood for birds with respect to protecting the enzyme from organophosphate inhibition. There were significantly higher esterases activities in dilution 1:10 in all blood samples from quail, duck, and chick compared to other dilutions (1:5, 1:15, 1:20, and 1:25). Furthermore, our results also pointed to the importance of estimating different dilutions effects prior to using in birds as biomarker tools of environmental exposure. Concentration–inhibition curves were determined for the inhibitor in the presence of dilutions 1:5, 1:10 plus 1:15 (to stimulate carboxylesterase). Point estimates (concentrations calculated to produce 20, 50, and 80% inhibition) were compared across conditions and served as a measure of esterase-mediated detoxification. Among the thiol esters (dilution 1:5) was observed to have the highest specificity constant (kcat/Km), and the Km and kcat values were 176 μM and 16,765 s−1, respectively for S-phenyl thioacetate ester, while detected in (dilution 1:15) the lowest specificity constant (kcat/Km), and the Km and kcat values were 943 μM and 1154 s−1, respectively for acetylthiocholine iodide ester.

Keywords: esterase, animal, dilution, pesticides

Procedia PDF Downloads 499
340 Use of Remote Sensing for Seasonal and Temporal Monitoring in Wetlands: A Case Study of Akyatan Lagoon

Authors: A. Cilek, S. Berberoglu, A. Akin Tanriover, C. Donmez

Abstract:

Wetlands are the areas which have important effects and functions on protecting human life, adjust to nature, and biological variety, besides being potential exploitation sources. Observing the changes in these sensitive areas is important to study for data collecting and correct planning for the future. Remote sensing and Geographic Information System are being increasingly used for environmental studies such as biotope mapping and habitat monitoring. Akyatan Lagoon, one of the most important wetlands in Turkey, has been facing serious threats from agricultural applications in recent years. In this study, seasonal and temporal monitoring in wetlands system are determined by using remotely sensed data and Geographic Information Systems (GIS) between 1985 and 2015. The research method is based on classifying and mapping biotopes in the study area. The natural biotope types were determined as coastal sand dunes, salt marshes, river beds, coastal woods, lakes, lagoons.

Keywords: biotope mapping, GIS, remote sensing, wetlands

Procedia PDF Downloads 362
339 Lessons Learnt from Industry: Achieving Net Gain Outcomes for Biodiversity

Authors: Julia Baker

Abstract:

Development plays a major role in stopping biodiversity loss. But the ‘silo species’ protection of legislation (where certain species are protected while many are not) means that development can be ‘legally compliant’ and result in biodiversity loss. ‘Net Gain’ (NG) policies can help overcome this by making it an absolute requirement that development causes no overall loss of biodiversity and brings a benefit. However, offsetting biodiversity losses in one location with gains elsewhere is controversial because people suspect ‘offsetting’ to be an easy way for developers to buy their way out of conservation requirements. Yet the good practice principles (GPP) of offsetting provide several advantages over existing legislation for protecting biodiversity from development. This presentation describes the learning from implementing NG approaches based on GPP. It regards major upgrades of the UK’s transport networks, which involved removing vegetation in order to construct and safely operate new infrastructure. While low-lying habitats were retained, trees and other habitats disrupting the running or safety of transport networks could not. Consequently, achieving NG within the transport corridor was not possible and offsetting was required. The first ‘lessons learnt’ were on obtaining a commitment from business leaders to go beyond legislative requirements and deliver NG, and on the institutional change necessary to embed GPP within daily operations. These issues can only be addressed when the challenges that biodiversity poses for business are overcome. These challenges included: biodiversity cannot be measured easily unlike other sustainability factors like carbon and water that have metrics for target-setting and measuring progress; and, the mindset that biodiversity costs money and does not generate cash in return, which is the opposite of carbon or waste for example, where people can see how ‘sustainability’ actions save money. The challenges were overcome by presenting the GPP of NG as a cost-efficient solution to specific, critical risks facing the business that also boost industry recognition, and by using government-issued NG metrics to develop business-specific toolkits charting their NG progress whilst ensuring that NG decision-making was based on rich ecological data. An institutional change was best achieved by supporting, mentoring and training sustainability/environmental managers for these ‘frontline’ staff to embed GPP within the business. The second learning was from implementing the GPP where business partnered with local governments, wildlife groups and land owners to support their priorities for nature conservation, and where these partners had a say in decisions about where and how best to achieve NG. From this inclusive approach, offsetting contributed towards conservation priorities when all collaborated to manage trade-offs between: -Delivering ecologically equivalent offsets or compensating for losses of one type of biodiversity by providing another. -Achieving NG locally to the development whilst contributing towards national conservation priorities through landscape-level planning. -Not just protecting the extent and condition of existing biodiversity but ‘doing more’. -The multi-sector collaborations identified practical, workable solutions to ‘in perpetuity’. But key was strengthening linkages between biodiversity measures implemented for development and conservation work undertaken by local organizations so that developers support NG initiatives that really count.

Keywords: biodiversity offsetting, development, nature conservation planning, net gain

Procedia PDF Downloads 168
338 Urban Heritage and Its Role in the Tourism Development in Yemen: Case Study of Historic Town of Zabid

Authors: Yasser Alhiagi, Moshalleh Almoraekhi, Sameh Refaat

Abstract:

Urban heritage has an important status in the process of developing the Yemeni tourism sector. Urban heritage in Yemen differs depending on the regions and historical cities such as City of Old Sana'a, Historic Town of Zabid, Shibam Hadhramout, Taiz, and others. Zabid is an old town with a long history, founded in the 9th century. It has been the capital of Yemen from the 13th to the 15th century and played, because of its Islamic university, an important role in the Arab and Muslim world for many centuries. The aim of this research is to promote the built heritage of Historic Town of Zabid and explore the possibilities of visiting the rehabilitated buildings and other heritage attractions through tourism. It examines the nature of the relationship exists between tourism and built heritage. The research is intended to contribute to the strategy development of national tourism for the purpose of protecting, developing, and utilizing cultural heritage. Also, the research depended chiefly on the results of a field work proposed to be carried out at Historic Town of Zabid.

Keywords: historic town of Zabid, strategy, tourism development, urban heritage

Procedia PDF Downloads 291
337 Female Frontline Health Workers in High-Risk Workplaces: Legal Protection in Bangladesh amid the Covid-19 Pandemic

Authors: Nabila Farhin, Israt Jahan

Abstract:

Despite the feminisation of the global health force, women mostly engage in nursing, midwifery and community health workers (HWs), and the posts like surgeons, doctors, and specialists are generally male-dominated. It is also prominent in Bangladesh, where female HWs witness systematic workplace inequalities, discrimination, and underpayment. The Covid-19 pandemic put unsurmountable pressure on HWs as they had to serve in high-risk workplaces as frontliners. The already disadvantaged female HWs shouldered the same burden, were overworked without adequate occupational health and safety measures (OSH) and risked their lives. Acknowledging their vulnerable workplace conditions, the World Health Organization (WHO) and International Labour Organization (ILO) circulated a few specialised guidelines amid the peril. Bangladesh tried to adhere to international guidelines while formulating pandemic management strategies. In reality, the already weak and understaffed health sector collapsed with the patient influx and many HWs got infected and died in the line of duty, exposing the high-risk nature of the work. Unfortunately, the gender-segregated data of infected HWs are absent. This qualitative research investigates whether the existing laws of Bangladesh are adequate in protecting female HWs as frontliners in high-risk workplaces during the Covid-19 pandemic. The paper first examines international labour laws safeguarding female frontline HWs. It also analyses the specialised Covid-19 pandemic guidelines protecting their interests. Finally, the research investigates the compliance of Bangladesh as per international legal guidance during the pandemic. In doing so, it explores the domestic laws, professional guidelines for HWs and pandemic response strategies. The paper critically examines the primary sources like international and national statutes, rules, regulations and guidelines. Secondary sources like authoritative journal articles, books and newspaper reports are contextually analysed in line with the objective of the paper. The definition of HW is ambiguous in the labour laws of Bangladesh. It leads to confusion regarding the extent of legal protection rendered to female HWs at private hospitals in high-risk situations. The labour laws are not applicable in Public hospitals, as the employees follow the public service rules. Unfortunately, the country has no specialised law to protect HWs in high-risk workplaces, and the professional guidelines for HWs also remain inadequate in this regard. Even though the pandemic management strategies highlight some protective measures in high-risk situations, they only deal with HWs who are pregnant or have underlying health issues. No specialised protective guidelines can be found for female HWs as frontliners. Therefore, the laws are insufficient and failed to render adequate legal protection to female frontline HWs during the pandemic. The country also lacks comprehensive health legislation and uniform institutional and professional guidelines, preventing them from accessing grievance mechanisms. Hence, the female HWs felt victimised while duty-bound to serve in high-risk workplaces without adequate safeguards. Bangladesh should clarify the definition of HWs and standardise the service rules for providing medical care in high-risk workplaces. The research also recommends adequate health legislation and specialised legal protection to safeguard female HWs in future emergencies.

Keywords: female health workers (HWs), high-risk workplaces, Covid-19 pandemic, Bangladesh

Procedia PDF Downloads 53
336 Realistic Testing Procedure of Power Swing Blocking Function in Distance Relay

Authors: Farzad Razavi, Behrooz Taheri, Mohammad Parpaei, Mehdi Mohammadi Ghalesefidi, Siamak Zarei

Abstract:

As one of the major problems in protecting large-dimension power systems, power swing and its effect on distance have caused a lot of damages to energy transfer systems in many parts of the world. Therefore, power swing has gained attentions of many researchers, which has led to invention of different methods for power swing detection. Power swing detection algorithm is highly important in distance relay, but protection relays should have general requirements such as correct fault detection, response rate, and minimization of disturbances in a power system. To ensure meeting the requirements, protection relays need different tests during development, setup, maintenance, configuration, and troubleshooting steps. This paper covers power swing scheme of the modern numerical relay protection, 7sa522 to address the effect of the different fault types on the function of the power swing blocking. In this study, it was shown that the different fault types during power swing cause different time for unblocking distance relay.

Keywords: power swing, distance relay, power system protection, relay test, transient in power system

Procedia PDF Downloads 344
335 Lessons Learned from Ransomware-as-a-Service (RaaS) Organized Campaigns

Authors: Vitali Kremez

Abstract:

The researcher monitored an organized ransomware campaign in order to gain significant visibility into the tactics, techniques, and procedures employed by a campaign boss operating a ransomware scheme out of Russia. As the Russian hacking community lowered the access requirements for unsophisticated Russian cybercriminals to engage in ransomware campaigns, corporations and individuals face a commensurately greater challenge of effectively protecting their data and operations from being held ransom. This report discusses two notorious ransomware campaigns. Though the loss of data can be devastating, the findings demonstrate that sending ransom payments does not always help obtain data. Key learnings: 1. From the ransomware affiliate perspective, such campaigns have significantly lowered the barriers for entry for low-tier cybercriminals. 2. Ransomware revenue amounts are not as glamorous and fruitful as they are often publicly reported. Average ransomware crime bosses make only $90K per year on average. 3. Data gathered indicates that sending ransom payments does not always help obtain data. 4. The talk provides the complete payout structure and Bitcoin laundering operation related to the ransomware-as-a-service campaign.

Keywords: bitcoin, cybercrime, ransomware, Russia

Procedia PDF Downloads 166
334 A Literature Review on Sexual Abuse Prevention for People with Intellectual Disability

Authors: Hanh Thi My Nguyen, Phuong Thu Dinh

Abstract:

People with intellectual disability are at high risk for sexual abuse. The reasons may originate from their communication skills deficits, lack of skills and knowledge to protect themselves from sexual abuse, or limited access to sexual abuse prevention programs. This article aims to present a systematic review about strategies for preventing sexual abuse for young people with intellectual disability. A range of articles in 10 years from 2009 to 2018 are searched by using online database. 5 papers are included for the final review. The results of this comprehensive literature review showed that there are two main strategies used: programs designed for people with intellectual, including evaluation on sex education programs; and sexual education program for parents of children with intellectual disability. However, none of the papers were conducted in low-and middle-income countries. Therefore, cautions should be taken when it comes to interpret these findings. The findings of studies showed that participants increased their awareness and skills for protecting themselves from sexual abuse after participating in the programs. It is also recommended that more effective evidence-based programs should be developed.

Keywords: intellectual disability, prevention, sexual abuse, sexual education program

Procedia PDF Downloads 182
333 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod

Abstract:

The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.

Keywords: XML database, trust-based access control, severity-aware, trust values, log file

Procedia PDF Downloads 272
332 Wireless Transmission of Big Data Using Novel Secure Algorithm

Authors: K. Thiagarajan, K. Saranya, A. Veeraiah, B. Sudha

Abstract:

This paper presents a novel algorithm for secure, reliable and flexible transmission of big data in two hop wireless networks using cooperative jamming scheme. Two hop wireless networks consist of source, relay and destination nodes. Big data has to transmit from source to relay and from relay to destination by deploying security in physical layer. Cooperative jamming scheme determines transmission of big data in more secure manner by protecting it from eavesdroppers and malicious nodes of unknown location. The novel algorithm that ensures secure and energy balance transmission of big data, includes selection of data transmitting region, segmenting the selected region, determining probability ratio for each node (capture node, non-capture and eavesdropper node) in every segment, evaluating the probability using binary based evaluation. If it is secure transmission resume with the two- hop transmission of big data, otherwise prevent the attackers by cooperative jamming scheme and transmit the data in two-hop transmission.

Keywords: big data, two-hop transmission, physical layer wireless security, cooperative jamming, energy balance

Procedia PDF Downloads 456
331 The Influence of Remuneration Committees, Directors' Shareholding and Institutional Ownership on the Remuneration of Directors in the Large Listed Companies in South Africa

Authors: Henriette Scholtz

Abstract:

Excessive executive directors’ remuneration remains a major concern for many stakeholders and are some of the factors to blame for the recent global financial crisis. The objective of this study was to examine whether certain firm characteristics are an effective way of protecting shareholders’ interests with respect to executive directors’ remuneration. To achieve this, an ordinary least squares model was used to test the relationship between the remuneration of executive directors and a number of firm and corporate governance characteristics to determine whether these characteristics have an influence on executive directors’ remuneration of large listed companies in South Africa. It was found that corporate governance reforms relating to institutional ownership, shareholder voting on the remuneration policy and the number of remuneration committee meetings acts as an effective governance tool to protect shareholder’s interests with regard to executive remuneration. There is no evidence that the number of non-executive directors on the remuneration committee has an influence on the executive directors’ remuneration.

Keywords: executive directors’ remuneration, agency theory, corporate governance, remuneration committee, directors’ shareholding, institutional ownership

Procedia PDF Downloads 171
330 Using Bamboo Structures for Protecting Mangrove Ecosystems: A Nature-Based Approach

Authors: Sourabh Harihar, Henk Jan Verhagen

Abstract:

The nurturing of a mangrove ecosystem requires a protected coastal environment with adequate drainage of the soil substratum. In a conceptual design undertaken for a mangrove rejuvenation project along the eastern coast of Mumbai (India), various engineering alternatives have been thought of as a protective coastal structure and drainage system. One such design uses bamboo-pile walls in creating shielded compartments in the form of various layouts, coupled with bamboo drains. The bamboo-based design is found to be environmentally and economically advantageous over other designs like sand-dikes which are multiple times more expensive. Moreover, employing a natural material such as bamboo helps the structure naturally blend with the developing mangrove habitat, allaying concerns about dismantling the structure post mangrove growth. A cost-minimising and eco-friendly bamboo structure, therefore, promises to pave the way for large rehabilitation projects in future. As mangrove ecosystems in many parts of the world increasingly face the threat of destruction due to urban development and climate change, protective nature-based designs that can be built in a short duration are the need of the hour.

Keywords: bamboo, environment, mangrove, rehabilitation

Procedia PDF Downloads 256
329 Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology

Authors: Aofan Liu, Qianqian Tan, Burra Venkata Durga Kumar

Abstract:

Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data.

Keywords: data privacy, distributed system, federated learning, machine learning

Procedia PDF Downloads 82
328 Experimental Study on Using the Aluminum Sacrificial Anode as a Cathodic Protection for Marine Structures

Authors: A. Radwan, A. Elbatran, A. Mehanna, M. Shehadeh

Abstract:

The corrosion is natural chemical phenomenon that is applied in many engineering structures. Hence, it is one of the important topics to study in the engineering research. Ship and offshore structures are most exposed to corrosion due to the presence of corrosive medium of air and the seawater. Consequently, investigation of the corrosion behavior and properties over ship and offshore hulls is one of the important topics to study in the marine engineering research. Using sacrificial anode is the most popular solution for protecting marine structures from corrosion. Hence, this research investigates the extent of corrosion between the composite ship model and relative velocity of water, along with the sacrificial aluminum anode consumption and its degree of protection in seawater. In this study, the consumption rate of sacrificial aluminum anode with respect to relative velocity at different Reynold’s numbers was studied experimentally, and it was found that, the degree of cathodic protection represented by the cathode potential at a given distance from the aluminum anode was decreased slightly with increment of the relative velocity.

Keywords: corrosion, Reynold's numbers, sacrificial anode, velocity

Procedia PDF Downloads 532
327 Small Farm Diversification Opportunities in Viticulture-Winemaking Sector of Georgia

Authors: E. Kharaishvili

Abstract:

The paper analyses the role of small farms in socio-economic development of agriculture in Georgia and evaluates modern concepts regarding the development of the farms of this size. The scale of farms in Georgia is studied and the major problems are revealed. Opportunities and directions of diversification are discussed from the point of increasing the share of Georgian grapes and wine both on domestic and international markets. It’s shown that the size of vineyard areas is directly reflected on the grape and wine production potential. Accordingly, vineyard area and grape production dynamics is discussed. Comparative analysis of small farms in Georgia and Italy is made and the major differences are identified. Diversification is evaluated based on cost-benefit analysis on the one hand and on the other hand, from the point of promoting economic activities, protecting nature and rural area development. The paper provides proofs for the outcomes of diversification. The key hindering factors for the development of small farms are identified and corresponding conclusions are made, based on which recommendations for diversification of the farms of this size are developed.

Keywords: small farms, scale of farms, diversification, Georgia

Procedia PDF Downloads 358
326 Turbulent Election History: An Appraisal of Triggering Issues in Nigeria

Authors: Olajumoke Tolulope Esan, Odunayo Stephen Faluse

Abstract:

Nigeria’s electoral politics from independence has been tumultuous. Violence has continued to damage the conduct of almost all general elections in Nigeria, Thereby making free and fair elections an event that seems to be unachievable in the history of the nation’s politics. Apparently, electoral violence has subjected the Nation into stereotyped electoral procedures that are always dictated through powerful political Godfathers. However, the shameful act of riotous and tumultuous election processes has led to a political, national instability festering irregularities that manifest at different stages of the election, thus subjecting almost all elections carried out in Nigeria below the minimum democracy standard. Hence the fact that an average Nigerian is being deprived of his or her individual electoral rights should be enough to attract Global political interventions from the western world as Nigeria is part of the commonwealth countries and every Nigerians have the right to demand for posterity to be ensured by protecting individual rightful votes. Basically for elections to be termed democratic, it must be free and fair. In view of this, A deep understanding of this paper is a reflection on the tides of electoral violence and the alarming precipitating factors that make free and fair election almost unreachable in Nigeria.

Keywords: democracy, election, electoral violence, political violence

Procedia PDF Downloads 399