Search results for: sink-hole attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 610

Search results for: sink-hole attack

160 Power System Cyber Security Risk in the Era of Digital Transformation

Authors: Rafat Rob, Khaled Alotaibi, Dana Nour, Abdullah Albadrani, Abdulmohsen Mulhim

Abstract:

Power systems digitization solutions provides a comprehensive smart, cohesive, interconnected network, extensive connectivity between digital assets, physical power plants, and resources to form digital economies. However, digitization has exposed the classical air gapped power plants to the rapid spread of cyber threats and attacks in the process delaying and forcing many organizations to rethink their cyber security policies and standards before they can augment their operation the new advanced digital devices. Cyber Security requirements for power systems (and industry control systems therein) demand a new approach, unique methodology, and design process that is completely different to Cyber Security measures designed for the IT systems. In practice, Cyber Security strategy, as applied to power systems, tends to be closely aligned to those measures applied for IT system purposes. The differentiator for Cyber Security in terms of power systems are the physical assets and applications used, alongside the ever-growing rate of expansion within the industry controls sector (in comparison to the relatively saturated growth observed for corporate IT systems). These factors increase the magnitude of the cyber security risk within such systems. The introduction of smart devices and sensors along the grid initiate vulnerable entry points to the systems. Every installed Smart Meter is a target; the way these devices communicate with each other may instigate a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack. Attacking one sensor or meter has the potential to propagate itself throughout the power grid reaching the IT network, where it may manifest itself as a malware infiltration.

Keywords: supply chain, cybersecurity, maturity model, risk, smart grid

Procedia PDF Downloads 72
159 Time-Domain Expressions for Bridge Self-Excited Aerodynamic Forces by Modified Particle Swarm Optimizer

Authors: Hao-Su Liu, Jun-Qing Lei

Abstract:

This study introduces the theory of modified particle swarm optimizer and its application in time-domain expressions for bridge self-excited aerodynamic forces. Based on the indicial function expression and the rational function expression in time-domain expression for bridge self-excited aerodynamic forces, the characteristics of the two methods, i.e. the modified particle swarm optimizer and conventional search method, are compared in flutter derivatives’ fitting process. Theoretical analysis and numerical results indicate that adopting whether the indicial function expression or the rational function expression, the fitting flutter derivatives obtained by modified particle swarm optimizer have better goodness of fit with ones obtained from experiment. As to the flutter derivatives which have higher nonlinearity, the self-excited aerodynamic forces, using the flutter derivatives obtained through modified particle swarm optimizer fitting process, are much closer to the ones simulated by the experimental. The modified particle swarm optimizer was used to recognize the parameters of time-domain expressions for flutter derivatives of an actual long-span highway-railway truss bridge with double decks at the wind attack angle of 0°, -3° and +3°. It was found that this method could solve the bounded problems of attenuation coefficient effectively in conventional search method, and had the ability of searching in unboundedly area. Accordingly, this study provides a method for engineering industry to frequently and efficiently obtain the time-domain expressions for bridge self-excited aerodynamic forces.

Keywords: time-domain expressions, bridge self-excited aerodynamic forces, modified particle swarm optimizer, long-span highway-railway truss bridge

Procedia PDF Downloads 288
158 Rhizosphere Microbiome Involvement in the Natural Suppression of Soybean Cyst Nematode in Disease Suppressive Soil

Authors: M. Imran Hamid, Muzammil Hussain, Yunpeng Wu, Meichun Xiang, Xingzhong Liu

Abstract:

The rhizosphere microbiome elucidate multiple functioning in the soil suppressiveness against plant pathogens. Soybean rhizosphere microbial communities may involve in the natural suppression of soybean cyst nematode (SCN) populations in disease suppressive soils. To explore these ecological mechanisms of microbes, a long term monoculture suppressive soil were taken into account for further investigation to test the disease suppressive ability by using different treatments. The designed treatments are as, i) suppressive soil (S), ii) conducive soil (C), iii) conducive soil mixed with 10% (w/w) suppressive soil (CS), iv) suppressive soil treated at 80°C for 1 hr (S80), and v) suppressive soil treated with formalin (SF). By using an ultra-high-throughput sequencing approach, we identified the key bacterial and fungal taxa involved in SCN suppression. The Phylum-level investigation of bacteria revealed that Actinobacteria, Bacteroidetes, and Proteobacteria in the rhizosphere soil of soybean seedlings were more abundant in the suppressive soil than in the conducive soil. The phylum-level analysis of fungi in rhizosphere soil indicated that relative abundance of Ascomycota was higher in suppressive soil than in the conducive soil, where Basidiomycota was more abundant. Transferring suppressive soil to conducive soil increased the population of Ascomycota in the conducive soil by lowering the populations of Basidiomycota. The genera, such as, Pochonia, Purpureocillium, Fusarium, Stachybotrys that have been well documented as bio-control agents of plant nematodes were far more in the disease suppressive soils. Our results suggested that the plants engage a subset of functional microbial groups in the rhizosphere for initial defense upon nematode attack and protect the plant roots later on by nematodes to response for suppression of SCN in disease-suppressive soils.

Keywords: disease suppressive soil, high-throughput sequencing, rhizosphere microbiome, soybean cyst nematode

Procedia PDF Downloads 123
157 The Security Trade-Offs in Resource Constrained Nodes for IoT Application

Authors: Sultan Alharby, Nick Harris, Alex Weddell, Jeff Reeve

Abstract:

The concept of the Internet of Things (IoT) has received much attention over the last five years. It is predicted that the IoT will influence every aspect of our lifestyles in the near future. Wireless Sensor Networks are one of the key enablers of the operation of IoTs, allowing data to be collected from the surrounding environment. However, due to limited resources, nature of deployment and unattended operation, a WSN is vulnerable to various types of attack. Security is paramount for reliable and safe communication between IoT embedded devices, but it does, however, come at a cost to resources. Nodes are usually equipped with small batteries, which makes energy conservation crucial to IoT devices. Nevertheless, security cost in terms of energy consumption has not been studied sufficiently. Previous research has used a security specification of 802.15.4 for IoT applications, but the energy cost of each security level and the impact on quality of services (QoS) parameters remain unknown. This research focuses on the cost of security at the IoT media access control (MAC) layer. It begins by studying the energy consumption of IEEE 802.15.4 security levels, which is followed by an evaluation for the impact of security on data latency and throughput, and then presents the impact of transmission power on security overhead, and finally shows the effects of security on memory footprint. The results show that security overhead in terms of energy consumption with a payload of 24 bytes fluctuates between 31.5% at minimum level over non-secure packets and 60.4% at the top security level of 802.15.4 security specification. Also, it shows that security cost has less impact at longer packet lengths, and more with smaller packet size. In addition, the results depicts a significant impact on data latency and throughput. Overall, maximum authentication length decreases throughput by almost 53%, and encryption and authentication together by almost 62%.

Keywords: energy consumption, IEEE 802.15.4, IoT security, security cost evaluation

Procedia PDF Downloads 128
156 Fast Aerodynamic Evaluation of Transport Aircraft in Early Phases

Authors: Xavier Bertrand, Alexandre Cayrel

Abstract:

The early phase of an aircraft development is instrumental as it really drives the potential of a new concept. Any weakness in the high-level design (wing planform, moveable surfaces layout etc.) will be extremely difficult and expensive to recover later in the aircraft development process. Aerodynamic evaluation in this very early development phase is driven by two main criteria: a short lead-time to allow quick iterations of the geometrical design, and a high quality of the calculations to get an accurate & reliable assessment of the current status. These two criteria are usually quite contradictory. Actually, short lead time of a couple of hours from end-to-end can be obtained with very simple tools (semi-empirical methods for instance) although their accuracy is limited, whereas higher quality calculations require heavier/more complex tools, which obviously need more complex inputs as well, and a significantly longer lead time. At this point, the choice has to be done between accuracy and lead-time. A brand new approach has been developed within Airbus, aiming at obtaining quickly high quality evaluations of the aerodynamic of an aircraft. This methodology is based on a joint use of Surrogate Modelling and a lifting line code. The Surrogate Modelling is used to get the wing sections characteristics (e.g. lift coefficient vs. angle of attack), whatever the airfoil geometry, the status of the moveable surfaces (aileron/spoilers) or the high-lift devices deployment. From these characteristics, the lifting line code is used to get the 3D effects on the wing whatever the flow conditions (low/high Mach numbers etc.). This methodology has been applied successfully to a concept of medium range aircraft.

Keywords: aerodynamics, lifting line, surrogate model, CFD

Procedia PDF Downloads 318
155 Engineering the Human Mind: Social Engineering Attack Using Kali Linux

Authors: Joy Winston James, Abdul Kadher Jilani

Abstract:

This review article provides a comprehensive overview of social engineering attacks, specifically those executed through the Kali Linux operating system. It aims to present an in-depth analysis of the background and importance of social engineering in cybersecurity, the tools, and techniques used in these attacks, real-world case studies that demonstrate their effectiveness, and ethical considerations that need to be taken into account while using them. The article highlights the Kali Linux tools that are commonly used in social engineering attacks, including SET, Metasploit, and BeEF, and discusses techniques such as phishing, pretexting, and baiting that are crucial in conducting successful social engineering attacks. It further explores real-world case studies that demonstrate the effectiveness of these techniques, emphasizing the importance of implementing effective countermeasures to reduce the risk of successful social engineering attacks. Moreover, the article sheds light on ethical considerations that need to be taken into account while using social engineering tools, emphasizing the importance of using them ethically and legally. Finally, the article provides potential countermeasures such as two-factor authentication, strong password policies, and regular security audits to help individuals and organizations better protect themselves against this growing threat. By understanding the tools and techniques used in social engineering attacks and implementing appropriate countermeasures, individuals and organizations can minimize the risk of successful social engineering attacks and improve their cybersecurity posture. To illustrate the effectiveness of social engineering attacks, we present real-world case studies that demonstrate how easily individuals and organizations can fall prey to these attacks. We also discuss ethical considerations that must be taken into account while using social engineering tools, emphasizing the need for responsible and legal use of these tools.

Keywords: pen testing, hacking, Kali Linux, social engineering

Procedia PDF Downloads 50
154 The Shrinking Nature of Parliamentary Immunity in Kenya: A Proposal for Judicial Restraint

Authors: Oscar Sang, Shadrack David Rotich

Abstract:

Parliamentary immunity is grounded on the notion that parliaments need certain rights or immunities to ensure they can operate independently make fair and impartial decisions without capitulating to political pressure or intimidation. The 2013 election in Kenya marked an important milestone in the development of the law of parliamentary privilege. Such importance relates to the dramatic increase in the number of legislatures in the country from one unicameral parliament, to a bicameral national parliament and forty-seven other regional legislative assemblies. The increase in legislatures has resulted in a dramatic increase in political contestations which have led to legal wrangles. The judiciary in Kenya, once considered submissive, has been invited to arbitrate on various matters pitting individual rights and parliamentary privilege and have invalidated a number of legislative action. While judicial intervention is indeed necessary to ensure that legislatures in Kenya live true to the constitutional aspirations of the Kenyan people, certain judicial decisions have had an effect on eroding parliamentary immunity. This paper highlights a number of instances in which it could be argued that parliamentary privilege came under attack by the courts in Kenya. The paper aims to make a case that while Kenya’s progressive constitution necessitates the scope and extent of legislature’s immunities and privilege to be determined by the courts, it is important that courts exercise restraint in its review of legislative action. The paper makes the argument that unrestrained judicial action in Kenya on questions within the realm parliamentary privilege may undermine the functioning of Kenya’s legislatures. The paper explores approaches taken by a number of jurisdictions in establishing a proper balance between maintaining a viable parliamentary privilege regime in a rights-based constitutional system.

Keywords: Kenya, constitution, judicial restraint, parliamentary privilege

Procedia PDF Downloads 129
153 Study of Microbial Diversity Associated with Tarballs and Their Exploitation in Crude Oil Degradation

Authors: Varsha Shinde, Belle Damodara Shenoy

Abstract:

Tarballs are crude oil remnants found in oceans after long term weathering process and are a global concern since several decades as potential marine pollutant. Being complicated in structure microbial remediation of tarballs in natural environment is a slow process. They are rich in high molecular weight alkanes and poly aromatic hydrocarbons which are resistant to microbial attack and other environmental factors, therefore remain in environment for long time. However, it has been found that many bacteria and fungi inhabit on tarballs for nutrients and shelter. Many of them are supposed to be oil degraders, while others are supposed to be getting benefited by byproducts formed during hydrocarbon metabolism. Thus tarballs are forming special interesting ecological niche of microbes. This work aimed to study diversity of bacteria and fungi from tarballs and to see their potential application in crude oil degradation. The samples of tarballs were collected from Betul beach of south Goa (India). Different methods were used to isolate culturable fraction of bacteria and fungi from it. Those were sequenced for 16S rRNA gene and ITS for molecular level identification. The 16S rRNA gene sequence analysis revealed the presence of 13 bacterial genera/clades (Alcanivorax, Brevibacterium, Bacillus, Cellulomonas, Enterobacter, Klebsiella, Marinobacter, Nitratireductor, Pantoea, Pseudomonas, Pseudoxanthomonas, Tistrella and Vibrio), while the ITS sequence analysis placed the fungi in 8 diverse genera/ clades (Aspergillus, Byssochlamys, Monascus, Paecilomyces, Penicillium, Scytalidium/ Xylogone, Talaromyces and Trichoderma). All bacterial isolates were screened for oil degradation capacity. Potential strains were subjected to crude oil degradation experiment for quantification. Results were analyzed by GC-MS-MS.

Keywords: bacteria, biodegradation, crude oil, diversity, fungi, tarballs

Procedia PDF Downloads 193
152 Management of Insect Pests Using Baculovirus Based Biopesticides in India

Authors: Mudasir Gani, Rakesh Kumar Gupta, Kamlesh Bali, Abdul Rouf Wani

Abstract:

The gypsy moth (Lymantria obfuscata) and tent caterpillar (Malacosoma indicum) are serious pests that attack a wide range of fruit and forest trees in Jammu & Kashmir range of North-Western Himalayas in India. Investigations were carried out to isolate and bioprospect naturally occurring nucleopolyhedroviruses (NPVs) as potent biopesticides against these pests. The biological and molecular characterization of NPV isolates from different ecosystems was conducted, and the polh, lef-8 and lef-9 genes were sequenced and subjected to phylogenetic analysis. The L. obfuscata NPV was more closely related to the L. dispar NPV, whereas M. indicum NPV was more closely related to the M. californicum NPV in the NCBI taxonomy database. Among different isolates, Bhaderwah isolates exhibited highest virus activity (LD₅₀ = 250 POBs/larvae) and speed of kill (ST₅₀ = 6.80 days) against L. obfuscata whereas Mahor isolates proved most virulent against M. indicum, with lowest LD₅₀ (257 POBs/larva) and ST₅₀ (6.80 days). The in vivo mass production for highest productivity and quality revealed that the optimum yield was obtained when 3rd instar larvae were inoculated with a viral dose of 1.44 × 105 POBs/larva and allowed to incubate for nine days for L. obfuscata. However, for M. indicum larvae, a viral dose of 2.88 × 10⁶ POBs/larva and incubation period of 10 days were found optimum. It was found that harvesting of moribund larvae yields good quality NPV. The field application of L. obfuscata NPV and M. indicum NPV against the respective host populations on apple and willow with the pre-standardized dosage of 1 × 10¹² POBs/acre reduced the larval population density up to 25-63%.

Keywords: baculoviruses, biopesticides, Lymantria obfuscata, Malacosoma indicum

Procedia PDF Downloads 83
151 Machine Learning-Based Techniques for Detecting and Mitigating Cyber-attacks on Automatic Generation Control in Smart Grids

Authors: Sami M. Alshareef

Abstract:

The rapid growth of smart grid technology has brought significant advancements to the power industry. However, with the increasing interconnectivity and reliance on information and communication technologies, smart grids have become vulnerable to cyber-attacks, posing significant threats to the reliable operation of power systems. Among the critical components of smart grids, the Automatic Generation Control (AGC) system plays a vital role in maintaining the balance between generation and load demand. Therefore, protecting the AGC system from cyber threats is of paramount importance to maintain grid stability and prevent disruptions. Traditional security measures often fall short in addressing sophisticated and evolving cyber threats, necessitating the exploration of innovative approaches. Machine learning, with its ability to analyze vast amounts of data and learn patterns, has emerged as a promising solution to enhance AGC system security. Therefore, this research proposal aims to address the challenges associated with detecting and mitigating cyber-attacks on AGC in smart grids by leveraging machine learning techniques on automatic generation control of two-area power systems. By utilizing historical data, the proposed system will learn the normal behavior patterns of AGC and identify deviations caused by cyber-attacks. Once an attack is detected, appropriate mitigation strategies will be employed to safeguard the AGC system. The outcomes of this research will provide power system operators and administrators with valuable insights into the vulnerabilities of AGC systems in smart grids and offer practical solutions to enhance their cyber resilience.

Keywords: machine learning, cyber-attacks, automatic generation control, smart grid

Procedia PDF Downloads 50
150 Affordable Aerodynamic Balance for Instrumentation in a Wind Tunnel Using Arduino

Authors: Pedro Ferreira, Alexandre Frugoli, Pedro Frugoli, Lucio Leonardo, Thais Cavalheri

Abstract:

The teaching of fluid mechanics in engineering courses is, in general, a source of great difficulties for learning. The possibility of the use of experiments with didactic wind tunnels can facilitate the education of future professionals. The objective of this proposal is the development of a low-cost aerodynamic balance to be used in a didactic wind tunnel. The set is comprised of an Arduino microcontroller, programmed by an open source software, linked to load cells built by students from another project. The didactic wind tunnel is 5,0m long and the test area is 90,0 cm x 90,0 cm x 150,0 cm. The Weq® electric motor, model W-22 of 9,2 HP, moves a fan with nine blades, each blade 32,0 cm long. The Weq® frequency inverter, model WEGCFW 08 (Vector Inverter) is responsible for wind speed control and also for the motor inversion of the rotational direction. A flat-convex profile prototype of airfoil was tested by measuring the drag and lift forces for certain attack angles; the air flux conditions remained constant, monitored by a Pitot tube connected to a EXTECH® Instruments digital pressure differential manometer Model HD755. The results indicate a good agreement with the theory. The choice of all of the components of this proposal resulted in a low-cost product providing a high level of specific knowledge of mechanics of fluids, which may be a good alternative to teaching in countries with scarce educational resources. The system also allows the expansion to measure other parameters like fluid velocity, temperature, pressure as well as the possibility of automation of other functions.

Keywords: aerodynamic balance, wind tunnel, strain gauge, load cell, Arduino, low-cost education

Procedia PDF Downloads 404
149 Combining Transcriptomics, Bioinformatics, Biosynthesis Networks and Chromatographic Analyses for Cotton Gossypium hirsutum L. Defense Volatiles Study

Authors: Ronald Villamar-Torres, Michael Staudt, Christopher Viot

Abstract:

Cotton Gossypium hirsutum L. is one of the most important industrial crops, producing the world leading natural textile fiber, but is very prone to arthropod attacks that reduce crop yield and quality. Cotton cultivation, therefore, makes an outstanding use of chemical pesticides. In reaction to herbivorous arthropods, cotton plants nevertheless show natural defense reactions, in particular through volatile organic compounds (VOCs) emissions. These natural defense mechanisms are nowadays underutilized but have a very high potential for cotton cultivation, and elucidating their genetic bases will help to improve their use. Simulating herbivory attacks by mechanical wounding of cotton plants in greenhouse, we studied by qPCR the changes in gene expression for genes of the terpenoids biosynthesis pathway. Differentially expressed genes corresponded to higher levels of the terpenoids biosynthesis pathway and not to enzymes synthesizing particular terpenoids. The genes were mapped on the G. hirsutum L. reference genome; their global relationships inside the general metabolic pathways and the biosynthesis of secondary metabolites were visualized with iPath2. The chromatographic profiles of VOCs emissions indicated first monoterpenes and sesquiterpenes emissions, dominantly four molecules known to be involved in plant reactions to arthropod attacks. As a result, the study permitted to identify potential key genes for the emission of volatile terpenoids by cotton plants in reaction to an arthropod attack, opening possibilities for molecular-assisted cotton breeding in benefit of smallholder cotton growers.

Keywords: biosynthesis pathways, cotton, mechanisms of plant defense, terpenoids, volatile organic compounds

Procedia PDF Downloads 331
148 Obesity and Physical Inactivity: Contributing Factors to Hypertension in Early Adults

Authors: Sadaf Ambreen, Ayesha Bibi, Sara Rafiq

Abstract:

Hypertension is a medical condition in which blood pressure in the arteries is elevated than the normal, having systolic blood pressure more than 120mmHg and diastolic blood pressure more than 80 mmHg. It leads to health complications and increase the risk of diseases such as stroke, heart failure, heart attack, and even death. The aim of the current study was to evaluate nutritional status and activity level among hypertensive early adults in District Mardan Data was collected from the subjects of Public Hospital, Mardan Medical Complex, through questionnaire. A complete information about individual sociodemographic, anthropometry and health status were collected, and physical activity was assessed by using IPAQ questionnaire. A total of 150 individuals were included in the study, in which 90% were females, and 10% were males. Data was analyzed through SPSS Version 22. Majority of the study subjects, 88%, were married, 70% having nuclear living system, 43% were having elementary education, and 43% were working as laborer. Body mass index and waist circumference in female counterpart were found to be positively associated with hypertension and was found statistically significant P=<0.01. Results showed that majority of females were fall in hypertension crisis category with mild activity, and males were having hypertension stage 1 with moderate activity. Our study concluded that non-optimal nutritional status and physical inactivity resulted in elevated blood pressure in females, therefore, lifestyle change such as optimal nutritional status and physical activity may play key role in reducing risk of hypertension.

Keywords: obesity/overwight, body mass index, waist circumference, early adulthood

Procedia PDF Downloads 112
147 Violence in the School Environment: When the Teenager Encounters the Threat of Depression

Authors: Ndje Ndje Mireille

Abstract:

For some years in Cameroon, there has been an increase in violence in schools. This violence has gone from verbal to physical, sometimes going as far as murder. At the centre of this violence, we find the student who is a teenager in the midst of both physical and psychological changes. The unpredictable transformations of his body, the unexpected emotions arrouse when he encouters someonelse, intrusion, shortcomings, boredom, loneliness and self-deception are the threats to which the teenager faces daily. From the psychopathological point of view, the greatest threat in adolesence is probably the depresive threat. During adolescence and for several resons, the subject is confronted with the self image. He displays certantity which sometimes hides great uncertaintity about what leads him to manifest some particular behaviours or undertake certain actions. Faced with aggressiveness twards those he confronts, he feels more or less guilt. This can lead a certain number of adolescents to feel heplessness faced to their vis-à-vis, faced to life. This helplessness is sometimes reinforced by the social, cultural and economic context in which they are. The teeneger then feels threatens by this depression which, when it reaches its extreme, it is manifested by the feeling that he can no longer do anything. Generally, the depressive threats manifest itself in defensive forms vis-à-vis with the depression itself. Reason why, it is indeed a threat and not a threshold already crossed. This threat often manifests itself in inappropriate forms of attack on one’s own body as seen in a number of repetitive risky behaviours. We also see teenegers confront peers and even adults through physical attacks and often go as far as murder. All these behaviours appears as an absurd way of attacking and at the same time confronting the feeling of remaining alive. This depressive threats can also be expressed in forms of attacks on an individual’s thinking abilities or more explicitely in the form of accademic downfall. The depressive threats does not sum up all the problems of adolescence, but, undoubtly represents currently, one of the deepest form of unease adolescents face.

Keywords: violence, school, depression threats, adolescent, behavior

Procedia PDF Downloads 60
146 Cinematic Liberty vs. Offending Social, Religious Beliefs: With Special Reference to the Controversial Contents in Cinema and Print Media

Authors: Govind Ji Pandey

Abstract:

The divergent opinions in the society are important for its development but with reasonable restrictions. The world recently witnessed one of the most violent protests by a group against the editor and publisher of the magazine ‘Charlie Hebdo’ for publishing cartoon of their religious leader. The supporter of freedom of speech and expression around the world were in shock and termed it the strongest attack against the free speech. People all around the world condemned the killing of the journalists but many soft voices from several corners were also coming for reasonable restrictions on the freedom of speech and expression. Of late, Indian society has witnessed many protests and supports of films with controversial content. It is the beauty of the Indian democracy which gives an opportunity to all for discussion and debate on any issue that challenges established social norms. However, many organizations as well as individuals misuse it for their personal benefits. There have been many film directors who faced protest from several quarters for their controversial themes. This research aims at analyzing the controversial contents published in print media and shown in films. To understand the nature and frequency of such media reports, content analysis technique is used. The research also highlights the perception of the public regarding the controversies. For getting the popular opinion on the coverage of controversial content in cinema and print media, five hundred people from Lucknow, UP, India were randomly selected. The findings of this research are important to understand the response of media and society towards the controversial content presented in cinema and print media. The research highlights that how a handful of people curb free speech in a democratic country like India.

Keywords: cinema, censor board, free speech, liberty, social-religious beliefs

Procedia PDF Downloads 231
145 Quantification of Factors Contributing to Wave-In-Deck on Fixed Jacket Platforms

Authors: C. Y. Ng, A. M. Johan, A. E. Kajuputra

Abstract:

Wave-in-deck phenomenon for fixed jacket platforms at shallow water condition has been reported as a notable risk to the workability and reliability of the platform. Reduction in reservoir pressure, due to the extraction of hydrocarbon for an extended period of time, has caused the occurrence of seabed subsidence. Platform experiencing subsidence promotes reduction of air gaps, which eventually allows the waves to attack the bottom decks. The impact of the wave-in-deck generates additional loads to the structure and therefore increases the values of the moment arms. Higher moment arms trigger instability in terms of overturning, eventually decreases the reserve strength ratio (RSR) values of the structure. The mechanics of wave-in-decks, however, is still not well understood and have not been fully incorporated into the design codes and standards. Hence, it is necessary to revisit the current design codes and standards for platform design optimization. The aim of this study is to evaluate the effects of RSR due to wave-in-deck on four-legged jacket platforms in Malaysia. Base shear values with regards to calibration and modifications of wave characteristics were obtained using SESAM GeniE. Correspondingly, pushover analysis is conducted using USFOS to retrieve the RSR. The effects of the contributing factors i.e. the wave height, wave period and water depth with regards to the RSR and base shear values were analyzed and discussed. This research proposal is important in optimizing the design life of the existing and aging offshore structures. Outcomes of this research are expected to provide a proper evaluation of the wave-in-deck mechanics and in return contribute to the current mitigation strategies in managing the issue.

Keywords: wave-in-deck loads, wave effects, water depth, fixed jacket platforms

Procedia PDF Downloads 403
144 Software-Defined Networking: A New Approach to Fifth Generation Networks: Security Issues and Challenges Ahead

Authors: Behrooz Daneshmand

Abstract:

Software Defined Networking (SDN) is designed to meet the future needs of 5G mobile networks. The SDN architecture offers a new solution that involves separating the control plane from the data plane, which is usually paired together. Network functions traditionally performed on specific hardware can now be abstracted and virtualized on any device, and a centralized software-based administration approach is based on a central controller, facilitating the development of modern applications and services. These plan standards clear the way for a more adaptable, speedier, and more energetic network beneath computer program control compared with a conventional network. We accept SDN gives modern inquire about openings to security, and it can significantly affect network security research in numerous diverse ways. Subsequently, the SDN architecture engages systems to effectively screen activity and analyze threats to facilitate security approach modification and security benefit insertion. The segregation of the data planes and control and, be that as it may, opens security challenges, such as man-in-the-middle attacks (MIMA), denial of service (DoS) attacks, and immersion attacks. In this paper, we analyze security threats to each layer of SDN - application layer - southbound interfaces/northbound interfaces - controller layer and data layer. From a security point of see, the components that make up the SDN architecture have a few vulnerabilities, which may be abused by aggressors to perform noxious activities and hence influence the network and its administrations. Software-defined network assaults are shockingly a reality these days. In a nutshell, this paper highlights architectural weaknesses and develops attack vectors at each layer, which leads to conclusions about further progress in identifying the consequences of attacks and proposing mitigation strategies.

Keywords: software-defined networking, security, SDN, 5G/IMT-2020

Procedia PDF Downloads 61
143 Lightweight and Seamless Distributed Scheme for the Smart Home

Authors: Muhammad Mehran Arshad Khan, Chengliang Wang, Zou Minhui, Danyal Badar Soomro

Abstract:

Security of the smart home in terms of behavior activity pattern recognition is a totally dissimilar and unique issue as compared to the security issues of other scenarios. Sensor devices (low capacity and high capacity) interact and negotiate each other by detecting the daily behavior activity of individuals to execute common tasks. Once a device (e.g., surveillance camera, smart phone and light detection sensor etc.) is compromised, an adversary can then get access to a specific device and can damage daily behavior activity by altering the data and commands. In this scenario, a group of common instruction processes may get involved to generate deadlock. Therefore, an effective suitable security solution is required for smart home architecture. This paper proposes seamless distributed Scheme which fortifies low computational wireless devices for secure communication. Proposed scheme is based on lightweight key-session process to upheld cryptic-link for trajectory by recognizing of individual’s behavior activities pattern. Every device and service provider unit (low capacity sensors (LCS) and high capacity sensors (HCS)) uses an authentication token and originates a secure trajectory connection in network. Analysis of experiments is revealed that proposed scheme strengthens the devices against device seizure attack by recognizing daily behavior activities, minimum utilization memory space of LCS and avoids network from deadlock. Additionally, the results of a comparison with other schemes indicate that scheme manages efficiency in term of computation and communication.

Keywords: authentication, key-session, security, wireless sensors

Procedia PDF Downloads 294
142 Effect of Palm Bunch Ash and Neem (Azardirachta indica A. Juss) Leaf Powder on Termite Infestation in Groundnut Field

Authors: K. O. Ogbedeh, C. P. Ekwe, G. O. Ihejirika, S. A. Dialoke, O. P. Onyewuchi, C. P. Anyanwu, I. E. Kalu

Abstract:

As one of the major pests of field crops, termites attack groundnut at all stages of its development, especially during prolonged dry spell. Effect of palm bunch ash and neem(Azardirachta indica A. Juss) leaf powder on termite infestation in groundnut field in Owerri, Nigeria was investigated in this study. The field trial was carried out in 2016 at the Teaching and Research Farm of the Federal University of Technology, Owerri, Nigeria. The experiment was laid out in a 3x3 Factorial fitted into a Randomized Complete Block Design (RCBD) with three replications. The treatments include three rates of palm bunch ash at 0.0 (control), 1.0 and 2.0tons/ha and three rates of neem leaf powder at 0.0(control), 1.0, 2.0 tons/ha respectively. Data were collected on percentage emergence, termite incidence and termite severity. These were subjected to analysis of variance (ANOVA), and means were separated using least significant difference at 5% level of probability. The result shows that there were no significant (P= 0.05) differences in percentage emergence amongst treatment means due to palm bunch ash and neem leaf powder applications. Contrarily, palm bunch ash at 2.0 tons/ha recorded the least termite incidence especially at twelve weeks after planting (12WAP) with a value of 22.20% while control plot maintained highest values at 6WAP (48.70%) and 12WAP (48.30%) respectively. Also palm bunch ash at 2.0tons/ha depressed termite severity more than other treatments especially at 2 and 4 WAP (0.56) respectively. Control plots on the other hand consistently maintained highest termite severity throughout the trial with the highest value at 2 and 12WAP (1.56). Conclusively, palm bunch ash exhibited highest depressive action against termite on groundnut especially at higher application value (2.0tons/ha).

Keywords: groundnut, incidence, neem, palm, severity, termites

Procedia PDF Downloads 200
141 Screening of Different Exotic Varieties of Potato through Adaptability Trial for Local Cultivation

Authors: Arslan Shehroz, Muhammad Amjad Ali, Amjad Abbas, Imran Ramzan, Muhammad Zunair Latif

Abstract:

Potato (Solanum tuberosum L.) is the 4th most important food crop of the world after wheat, rice and maize. It is the staple food in many European countries. Being rich in starch (one of the main three food ingredients) and having the highest productivity per unit area, has great potential to address the challenge of the food security. Processed potato is also used as chips and crisps etc as ‘fast food’. There are many biotic and abiotic factors which check the production of potato and become hurdle in achievement production potential of potato. 20 new varieties along with two checks were evaluated. Plant to plant and row to row distances were maintained as 20 cm and 75 cm, respectively. The trial was conducted according to the randomized complete block design with three replications. Normal agronomic and plant protection measures were carried out in the crop. It is revealed from the experiment that exotic variety 171 gave the highest yield of 35.5 t/ha followed by Masai with 31.0 t/ha tuber yield. The check variety Simply Red 24.2 t/ha yield, while the lowest tuber yield (1.5 t/ha) was produced by the exotic variety KWS-06-125. The maximum emergence was shown by the Variety Red Sun (89.7 %). The lowest emergence was shown by the variety Camel (71.7%). Regarding tuber grades, it was noted that the maximum Ration size tubers were produced by the exotic variety Compass (3.7%), whereas 11 varieties did not produce ration size tubers at all. The variety Red Sun produced lowest percentage of small size tubers (12.7%) whereas maximum small size tubers (93.0%) were produced by the variety Jitka. Regarding disease infestation, it was noted that the maximum scab incidence (4.0%) was recorded on the variety Masai, maximum rhizoctonia attack (60.0%) was recorded on the variety Camel and maximum tuber cracking (0.7%) was noted on the variety Vendulla.

Keywords: check variety, potato, potential and yield, trial

Procedia PDF Downloads 353
140 Numerical Aeroacoustics Investigation of Eroded and Coated Leading Edge of NACA 64- 618 Airfoil

Authors: Zeinab Gharibi, B. Stoevesandt, J. Peinke

Abstract:

Long term surface erosion of wind turbine blades, especially at the leading edge, impairs aerodynamic performance; therefore, lowers efficiency of the blades mostly in the high-speed rotor tip regions. Blade protection provides significant improvements in annual energy production, reduces costly downtime, and protects the integrity of the blades. However, this protection still influences the aerodynamic behavior, and broadband noise caused by interaction between the impinging turbulence and blade’s leading edge. This paper presents an extensive numerical aeroacoustics approach by investigating the sound power spectra of the eroded and coated NACA 64-618 wind turbine airfoil and evaluates aeroacoustics improvements after the protection procedure. Using computational fluid dynamics (CFD), different quasi 2D numerical grids were implemented and special attention was paid to the refinement of the boundary layers. The noise sources were captured and decoupled with acoustic propagation via the derived formulation of Curle’s analogy implemented in OpenFOAM. Therefore, the noise spectra were compared for clean, coated and eroded profiles in the range of chord-based Reynolds number (1.6e6 ≤ Re ≤ 11.5e6). Angle of attack was zero in all cases. Verifications were conducted for the clean profile using available experimental data. Sensitivity studies for the far-field were done on different observational positions. Furthermore, beamforming studies were done simulating an Archimedean spiral microphone array for far-field noise directivity patterns. Comparing the noise spectra of the coated and eroded geometries, results show that, coating clearly improves aerodynamic and acoustic performance of the eroded airfoil.

Keywords: computational fluid dynamics, computational aeroacoustics, leading edge, OpenFOAM

Procedia PDF Downloads 192
139 Modelling Insider Attacks in Public Cloud

Authors: Roman Kulikov, Svetlana Kolesnikova

Abstract:

Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.

Keywords: insider attack, public cloud, cloud computing, hypervisor

Procedia PDF Downloads 334
138 Effect of Doping on Band Gap of Zinc Oxide and Degradation of Methylene Blue and Industrial Effluent

Authors: V. P. Borker, K. S. Rane, A. J. Bhobe, R. S. Karmali

Abstract:

Effluent of dye industries contains chemicals and organic dyes. Sometimes they are thrown in the water bodies without any treatment. This leads to environmental pollution and is detrimental to flora and fauna. Semiconducting oxide zinc oxide with wide bandgap 3.37 eV is used as a photocatalyst in degrading organic dyes using UV radiations. It generates electron-hole pair on exposure to UV light. If degradation is aimed at solar radiations, bandgap of zinc oxide is to be reduced so as to utilize visible radiation. Thus, in present study, zinc oxide, ZnO is synthesized from zinc oxalate, N doped zinc oxide, ZnO₁₋ₓNₓ from hydrazinated zinc oxalate, cadmium doped zinc oxide Zn₀.₉Cd₀.₁₀ and magnesium-doped zinc oxide Zn₀.₉Mg₀.₁₀ from mixed metal oxalate and hydrazinated mixed metal oxalate. The precursors were characterized by FTIR. They were decomposed to form oxides and XRD were recorded. The compounds were monophasic. Bandgap was calculated using Diffuse Reflectance Spectrum. The bandgap of ZnO was reduced to 3.24 because of precursor method of synthesis leading large surface area. The bandgap of Zn₀.₉Cd₀.₁₀ was 3.11 eV and that of Zn₀.₉Mg₀.₁₀ 3.41 eV. The lowest value was of ZnO₁₋ₓNₓ 3.09 eV. These oxides were used to degrade methylene blue, a model dye in sunlight. ZnO₁₋ₓNₓ was also used to degrade effluent of industry manufacturing colours, crayons and markers. It was observed that ZnO₁₋ₓNₓ acts as a good photocatalyst for degradation of methylene blue. It can degrade the solution within 120 minutes. Similarly, diluted effluent was decolourised using this oxide. Some colours were degraded using ZnO. Thus, the use of these two oxides could mineralize effluent. Lesser bandgap leads to more electro hole pair thus helps in the formation of hydroxyl ion radicals. These radicals attack the dye molecule, fragmentation takes place and it is mineralised.

Keywords: cadmium doped zinc oxide, dye degradation, dye effluent degradation, N doped zinc oxide, zinc oxide

Procedia PDF Downloads 133
137 Biotic Potential of Different Densities of Aphid Parasitoids, Diaeretiella rapae (Hymenoptera: Braconidae: Aphidiinae) Feeding on Brevicoryne brassicae

Authors: Muhammad Anjum Aqueel, Muhammad Jaffar Hussain, Abu Bakar Muhammad Raza

Abstract:

Diaeretiella rapae (M’Intosh) attack most of the aphid species. However, it is specialized in feeding on crucifer aphid, Brevicoryne brassicae. Biological potential of parasitoid is its density-dependency due to sharing of limited resources in few cases. The present study was carried out to check the biotic potential of D. rapae at its different densities (1, 2, 4, 8 and 10 pairs) on fixed number of B. brassicae (100 in number) as a host. The present study was performed under laboratory conditions (25 ± 2 ºC temperature and 65-70 % R.H.). Different biological parameters for parasitoid (e.g. percent parasitism, adult emergence, adult longevity and per pair parasitism) were evaluated to check its biotic potential. The present findings showed that maximum parasitism (43.09 % ± 0.63) was observed in highest density (10 pairs) and minimum parasitism (16.59 % ± 1.28) in lowest density (1 pair) of the parasitoid. Maximum adult emergence (80.31 % ± 1.33) was observed in highest density (10 pairs) and minimum parasitism (45.99 % ± 1.27) in lowest density (1 pair) of the parasitoid. In the case of adult longevity, highest (8.2 days ± 0.38) and lowest (6 days ± 0.32) longevity were observed in lowest (1 pair) and highest (10 pairs) densities of parasitoids respectively. However, per pair parasitism rate decreased with the increase in parasitoid densities due to intra-specific competition, developed between the parasitoids for parasitism. The positive but close relationship was observed between percent parasitism and adult emergence. The increase in parasitoid densities increased the percent parasitism and adult emergence of the parasitoid. So, we conclude that an inter-specific competition negatively affected the efficacy of parasitoids and may reduce the fitness of the emerging parasitoid.

Keywords: Diaeretiella rapae, Parasitoid densities, Percent parasitism, adult emergence

Procedia PDF Downloads 202
136 Multiple Version of Roman Domination in Graphs

Authors: J. C. Valenzuela-Tripodoro, P. Álvarez-Ruíz, M. A. Mateos-Camacho, M. Cera

Abstract:

In 2004, it was introduced the concept of Roman domination in graphs. This concept was initially inspired and related to the defensive strategy of the Roman Empire. An undefended place is a city so that no legions are established on it, whereas a strong place is a city in which two legions are deployed. This situation may be modeled by labeling the vertices of a finite simple graph with labels {0, 1, 2}, satisfying the condition that any 0-vertex must be adjacent to, at least, a 2-vertex. Roman domination in graphs is a variant of classic domination. Clearly, the main aim is to obtain such labeling of the vertices of the graph with minimum cost, that is to say, having minimum weight (sum of all vertex labels). Formally, a function f: V (G) → {0, 1, 2} is a Roman dominating function (RDF) in the graph G = (V, E) if f(u) = 0 implies that f(v) = 2 for, at least, a vertex v which is adjacent to u. The weight of an RDF is the positive integer w(f)= ∑_(v∈V)▒〖f(v)〗. The Roman domination number, γ_R (G), is the minimum weight among all the Roman dominating functions? Obviously, the set of vertices with a positive label under an RDF f is a dominating set in the graph, and hence γ(G)≤γ_R (G). In this work, we start the study of a generalization of RDF in which we consider that any undefended place should be defended from a sudden attack by, at least, k legions. These legions can be deployed in the city or in any of its neighbours. A function f: V → {0, 1, . . . , k + 1} such that f(N[u]) ≥ k + |AN(u)| for all vertex u with f(u) < k, where AN(u) represents the set of active neighbours (i.e., with a positive label) of vertex u, is called a [k]-multiple Roman dominating functions and it is denoted by [k]-MRDF. The minimum weight of a [k]-MRDF in the graph G is the [k]-multiple Roman domination number ([k]-MRDN) of G, denoted by γ_[kR] (G). First, we prove that the [k]-multiple Roman domination decision problem is NP-complete even when restricted to bipartite and chordal graphs. A problem that had been resolved for other variants and wanted to be generalized. We know the difficulty of calculating the exact value of the [k]-MRD number, even for families of particular graphs. Here, we present several upper and lower bounds for the [k]-MRD number that permits us to estimate it with as much precision as possible. Finally, some graphs with the exact value of this parameter are characterized.

Keywords: multiple roman domination function, decision problem np-complete, bounds, exact values

Procedia PDF Downloads 68
135 Seed Dressing and Foliar Spray of Green Bean (Phaseolus vulgaris L.) with Essential Oils and Disinfectants for Suppressing Root Rot and Wilt Incidence under Field Conditions

Authors: N. S. El-Mougy, M. M. Abdel-Kader, H. M. Abouelnasr

Abstract:

The efficacy of two essential oils applied as a bean seed dressing followed by seedlings foliar spray with four commercial disinfectants against root rot and wilt incidence was evaluated under field conditions. The essential oils, grape seed and peppermint oils and the disinfectants, Gold, Revarest, Klenva, Malva were applied. Chitosan and the fungicide Topsin-M were used as comparison treatment. Essential oils individually or combined with disinfectants were applied as a bean seed dressing. Furthermore, emerged bean plants were sprayed with the same treatments. Under laboratory conditions, growth inhibition effect was observed for the isolated, tested fungi R. solani and F. oxysporum when exposed to essential oils individually or combined with disinfectants. A high inhibitor effect was recorded for peppermint followed by grape seed oils. Concentrations of 1% and 2% of chitosan as well as Topsin M at 400 ppm showed complete reduction (100%) in the two fungal growths. Under field conditions, the obtained results showed that the applied treatments of chitosan had a superior effect on root rot and wilt disease incidence compared with other tested treatments. It was found that seed coating treatment provides good protection of emerged green bean seeds against the root pathogens attack compared with the fungicide and control treatments. Also, the application of seed dressing with essential oils accompanied by seedling spray demonstrated similar results. It was observed that essential oils had an enhancing effect against disease incidence when combined with disinfectants compared with their application. The obvious yield increase was significantly higher in all applied treatments than in fungicide and control.

Keywords: bean, disinfectants, essential oils, root rot, wilt

Procedia PDF Downloads 133
134 Save Lives: The Application of Geolocation-Awareness Service in Iranian Pre-hospital EMS Information Management System

Authors: Somayeh Abedian, Pirhossein Kolivand, Hamid Reza Lornejad, Amin Karampour, Ebrahim Keshavarz Safari

Abstract:

For emergency and relief service providers such as pre-hospital emergencies, quick arrival at the scene of an accident or any EMS mission is one of the most important requirements of effective service delivery. Response time (the interval between the time of the call and the time of arrival on scene) is a critical factor in determining the quality of pre-hospital Emergency Medical Services (EMS). This is especially important for heart attack, stroke, or accident patients. Location-based e-services can be broadly defined as any service that provides information pertinent to the current location of an active mobile handset or precise address of landline phone call at a specific time window, regardless of the underlying delivery technology used to convey the information. According to research, one of the effective methods of meeting this goal is determining the location of the caller via the cooperation of landline and mobile phone operators in the country. The follow-up of the Communications Regulatory Authority (CRA) organization has resulted in the receipt of two separate secured electronic web services. Thus, to ensure human privacy, a secure technical architecture was required for launching the services in the pre-hospital EMS information management system. In addition, to quicken medics’ arrival at the patient's bedside, rescue vehicles should make use of an intelligent transportation system to estimate road traffic using a GPS-based mobile navigation system independent of the Internet. This paper seeks to illustrate the architecture of the practical national model used by the Iranian EMS organization.

Keywords: response time, geographic location inquiry service (GLIS), location-based service (LBS), emergency medical services information system (EMSIS)

Procedia PDF Downloads 139
133 Human Factors Considerations in New Generation Fighter Planes to Enhance Combat Effectiveness

Authors: Chitra Rajagopal, Indra Deo Kumar, Ruchi Joshi, Binoy Bhargavan

Abstract:

Role of fighter planes in modern network centric military warfare scenarios has changed significantly in the recent past. New generation fighter planes have multirole capability of engaging both air and ground targets with high precision. Multirole aircraft undertakes missions such as Air to Air combat, Air defense, Air to Surface role (including Air interdiction, Close air support, Maritime attack, Suppression and Destruction of enemy air defense), Reconnaissance, Electronic warfare missions, etc. Designers have primarily focused on development of technologies to enhance the combat performance of the fighter planes and very little attention is given to human factor aspects of technologies. Unique physical and psychological challenges are imposed on the pilots to meet operational requirements during these missions. Newly evolved technologies have enhanced aircraft performance in terms of its speed, firepower, stealth, electronic warfare, situational awareness, and vulnerability reduction capabilities. This paper highlights the impact of emerging technologies on human factors for various military operations and missions. Technologies such as ‘cooperative knowledge-based systems’ to aid pilot’s decision making in military conflict scenarios as well as simulation technologies to enhance human performance is also studied as a part of research work. Current and emerging pilot protection technologies and systems which form part of the integrated life support systems in new generation fighter planes is discussed. System safety analysis application to quantify the human reliability in military operations is also studied.

Keywords: combat effectiveness, emerging technologies, human factors, systems safety analysis

Procedia PDF Downloads 116
132 Partnering with Stakeholders to Secure Digitization of Water

Authors: Sindhu Govardhan, Kenneth G. Crowther

Abstract:

Modernisation of the water sector is leading to increased connectivity and integration of emerging technologies with traditional ones, leading to new security risks. The convergence of Information Technology (IT) with Operation Technology (OT) results in solutions that are spread across larger geographic areas, increasingly consist of interconnected Industrial Internet of Things (IIOT) devices and software, rely on the integration of legacy with modern technologies, use of complex supply chain components leading to complex architectures and communication paths. The result is that multiple parties collectively own and operate these emergent technologies, threat actors find new paths to exploit, and traditional cybersecurity controls are inadequate. Our approach is to explicitly identify and draw data flows that cross trust boundaries between owners and operators of various aspects of these emerging and interconnected technologies. On these data flows, we layer potential attack vectors to create a frame of reference for evaluating possible risks against connected technologies. Finally, we identify where existing controls, mitigations, and other remediations exist across industry partners (e.g., suppliers, product vendors, integrators, water utilities, and regulators). From these, we are able to understand potential gaps in security, the roles in the supply chain that are most likely to effectively remediate those security gaps, and test cases to evaluate and strengthen security across these partners. This informs a “shared responsibility” solution that recognises that security is multi-layered and requires collaboration to be successful. This shared responsibility security framework improves visibility, understanding, and control across the entire supply chain, and particularly for those water utilities that are accountable for safe and continuous operations.

Keywords: cyber security, shared responsibility, IIOT, threat modelling

Procedia PDF Downloads 38
131 Health Ramifications of Workplace Bullying: Gender, Race and Sexual Orientation as Risk Factors

Authors: Kathleen Canul

Abstract:

Bullying is on the rise according to several recent studies. Workplace bullying has garnered less attention than other forms yet incidence rates range from 35-45%. The consequences of being bullied at work are broad, ranging from physiological to psychological to occupational. As the bullying progresses, employees begin to exhibit physical and psychological symptoms. Blood pressure rises, along with other cardiac related concerns. For men, covert coping with job unfairness was associated with a four-fold risk of heart attack and death. Gastrointestinal distress, headaches, muscle tension, sleep disorders and exhaustion are also common. Workplace bullying appears to contribute to the risk of subsequent psychotropic medication, as well. Emotionally, anxiety and depression increase along with lowered self-esteem and problems concentrating on the duties of the job. In an attempt to cope, individuals may succumb to unhealthy practices involving food, alcohol and other drugs. Patterns of bullying vary by gender, race, and ethnicity, as well as sexual orientation, with women, ethnic minorities and LGBTQ employees reporting higher rates of bullying in the workplace. Not only is this an issue of inequity on the job, but also a problem of health disparities as there are few mental health professionals confident and competent in dealing with workplace bullying issues, and the lack of culturally competent clinicians exacerbates this inequality in receiving adequate care. Alone, the topic of workplace bullying is not unique; however, the diverse experiences of underrepresented groups who disproportionately are affected on the job and suffer untreated, health related concerns represent a significant and emerging problem requiring attention. Conference participants who have experienced, witnessed or help those bullied on the job would benefit most from this review of the literature on the consequences of bullying experienced by diverse and underrepresented groups in the workplace.

Keywords: bullying, ethnic minorities, health disparities, workplace conflict

Procedia PDF Downloads 248