Search results for: socially engineered attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1260

Search results for: socially engineered attacks

960 Color Image Compression/Encryption/Contour Extraction using 3L-DWT and SSPCE Method

Authors: Ali A. Ukasha, Majdi F. Elbireki, Mohammad F. Abdullah

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. This paper is divided into two parts. This work interests with the color image which is decomposed into red, green and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using the key image that has same original size and are generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours from color images recovery can be obtained with accepted level of distortion using single step parallel contour extraction (SSPCE) method. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Color images and completely reconstructed without any distortion. Also shown that the analyzed algorithm has extremely large security against some attacks like salt and pepper and Jpeg compression. Its proof that the color images can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression and salt and peppers attacks, bitplanes decomposition, Arnold transform, color image, wavelet transform, lossless image encryption

Procedia PDF Downloads 494
959 Revenge: Dramaturgy and the Tragedy of Jihad

Authors: Myriam Benraad

Abstract:

On 5 July 2016, just days before the bloody terrorist attack on the Promenade des Anglais in Nice, the Al-Hayat media centre, one of the official propaganda branches of the Islamic State, broadcast a French nasheed which paid tribute to the Paris and Brussels attacks of November 2015 and March 2016. Entitled 'My Revenge', the terrorist anthem was of rare vehemence. It mentioned, sequentially, 'huddled bodies', in a reference to the civilian casualties of Western air strikes in the Iraqi-Syrian zone, 'explosive belts', 'sharp knives', 'large-calibre weapons' as well as 'localised targets'. France was accused of bearing the responsibility for the wave of attacks on its territory since the Charlie Hebdo massacre of January 2015 due to its 'ruthless war' against the Muslim world. Evoking an 'old aggression' and the 'crimes and spoliations' of which France has made itself guilty, the jihadist hymn depicted the rebirth of the caliphate as 'laudable revenge'. The notion of revenge has always been central to contemporary jihadism, understood both as a revolutionary ideology and a global militant movement. In recent years, the attacks carried out in Europe and elsewhere in the world have, for most, been claimed in its name. Whoever says jihad, says drama, yet few studies, if any, have looked at its dramatic and emotional elements, most notably its tragic vengefulness. This seems all the more astonishing that jihad is filled with drama; it could even be seen as a drama in its own right. The jihadists perform a script and take on roles inspired by their respective group’s culture (norms, values, beliefs, and symbols). The militants stage and perform such a script for a designated audience, either partisan, sympathising or hostile towards them and their cause. This research paper will examine the dramaturgy of jihadism and in particular, the genre that best characterises its violence: revenge tragedy. Theoretically, the research will rely on the tools of social movement theory and the sociology of emotions. Methodologically, it will draw from dramaturgical analysis and a combination of qualitative and quantitative tools to attain valuable observations of a number of developments, trends, and patterns. The choice has been made to focus mainly – however not exclusively – on the attacks which have taken place since 2001 in the European Union and more specific member states that have been significantly hit by jihadist terrorism. The research looks at a number of representative longitudinal samples identifying continuities and discontinuities, similarities, but also substantial differences. The preliminary findings tend to establish the relevance and validity of this approach in helping make better sense of sensitisation, mobilisation, and survival dynamics within jihadist groups, and motivations among individuals who have embraced violence. Besides, they illustrate their pertinence for counterterrorism policymakers and practitioners. Through drama, jihadist groups ensure the unceasing regeneration of their militant cause as well as their legitimation among their partisans. Without drama, and without the spectacular ideological staging of reality, they would not be able to maintain their attraction potential and power of persuasion.

Keywords: Jihadism, dramaturgy, revenge, tragedy

Procedia PDF Downloads 110
958 High Volume Fly Ash Concrete for Paver Blocks

Authors: Som Nath Sachdeva, Vanita Aggarwal, S. M. Gupta

Abstract:

Use of concrete paver blocks is becoming increasingly popular. They are used for paving of approaches, paths and parking areas including their application in pre-engineered buildings. This paper discusses the results of an experimental study conducted on Fly Ash Concrete with the aim to report its suitability for concrete paver blocks. In this study, the effect of varying proportions of fly ash, 20 % to 40 %, on compressive strength and flexural strength of concrete has been evaluated. The mix designs studied are M-30, M-35, M-40 and M-50. It is observed that all the fly ash based mixes are able to achieve the required compressive and flexural strengths. In comparison to control mixes, the compressive and flexural strengths of the fly ash based mixes are found to be slightly less at 7 days and 28 days and a little more at 90 days.

Keywords: fly ash concrete, paver blocks, compressive, flexural strength

Procedia PDF Downloads 381
957 Progressive Collapse of Cooling Towers

Authors: Esmaeil Asadzadeh, Mehtab Alam

Abstract:

Well documented records of the past failures of the structures reveals that the progressive collapse of structures is one of the major reasons for dramatic human loss and economical consequences. Progressive collapse is the failure mechanism in which the structure fails gradually due to the sudden removal of the structural elements. The sudden removal of some structural elements results in the excessive redistributed loads on the others. This sudden removal may be caused by any sudden loading resulted from local explosion, impact loading and terrorist attacks. Hyperbolic thin walled concrete shell structures being an important part of nuclear and thermal power plants are always prone to such terrorist attacks. In concrete structures, the gradual failure would take place by generation of initial cracks and its propagation in the supporting columns along with the tower shell leading to the collapse of the entire structure. In this study the mechanism of progressive collapse for such high raised towers would be simulated employing the finite element method. The aim of this study would be providing clear conceptual step-by-step descriptions of various procedures for progressive collapse analysis using commercially available finite element structural analysis software’s, with the aim that the explanations would be clear enough that they will be readily understandable and will be used by practicing engineers. The study would be carried out in the following procedures: 1. Provide explanations of modeling, simulation and analysis procedures including input screen snapshots; 2. Interpretation of the results and discussions; 3. Conclusions and recommendations.

Keywords: progressive collapse, cooling towers, finite element analysis, crack generation, reinforced concrete

Procedia PDF Downloads 455
956 From Forked Tongues to Tinkerbell Ears: Rethinking the Criminalization of Alternative Body Modification in the UK

Authors: Luci V. Hyett

Abstract:

The criminal law of England and Wales currently deems that a person cannot consent to the infliction of injury upon their own body, where the level of harm is considered to be Actual or Grevious. This renders the defence of consent of the victim as being unavailable to those persons carrying out an Alternative Body Modification procedure. However, the criminalization of consensual injury is more appropriately deemed as being categorized as an offense against public morality and not one against the person, which renders the State’s involvement in the autonomous choices of a consenting adult, when determining what can be done to one’s own body, an arbitrary one. Furthermore, to recognise in law that a person is capable of giving a valid consent to socially acceptable cosmetic interventions that largely consist of procedures designed to aesthetically please men and, not those of people who want to modify their bodies for other reasons means that patriarchal attitudes are continuing to underpin public repulsion and inhibit social acceptance of such practices. Theoretical analysis will begin with a juridical examination of R v M(B) [2019] QB 1 where the High Court determined that Alternative Body Modification was not a special category exempting a person so performing from liability for Grevious Bodily Harm using the defence of consent. It will draw from its reasoning which considered that ‘the removal of body parts were medical procedures being carried out for no medical reason by someone not qualified to carry them out’ which will form the basis of this enquiry. It will consider the philosophical work of Georgio Agamben when analysing whether the biopolitical climate in the UK, which places the optimization of the perfect, healthy body at the centre of political concern can explain why those persons who wish to engage in Alternative Body Modification are treated as the ‘Exception’ to that which is normal using the ‘no medical reason’ canon to justify criminalisation, rather than legitimising the industry through regulation. It will consider, through a feminist lens, the current conflict in law between traditional cosmetic interventions which alter one’s physical appearance for socially accepted aesthetic purposes such as those to the breast, lip and buttock and, modifications described as more outlandish such as earlobe stretching, tooth filing and transdermal implants to create horns and spikes under the skin. It will assert that ethical principles relating to the psychological impact of body modification described as ‘alternative’ is used as a means to exclude person’s seeking such a procedure from receiving safe and competent treatment via a registered cosmetic surgeon which leads to these increasingly popular surgery’s being performed in Tattoo parlours throughout the UK as an extension to other socially acceptable forms of self-modification such as piercings. It will contend that only by ‘inclusive exclusion’ will those ‘othered’ through ostracisation be welcomed into the fold of normality and this can only be achieved through recognition of alternative body modification as a legitimate cosmetic intervention, subject to the same regulatory framework as existing practice. This would assist in refocusing the political landscape by erring on the side of liberty rather than that of biology.

Keywords: biopolitics, body modification, consent, criminal law

Procedia PDF Downloads 87
955 Critical Analysis of the Caspian: The Role of Identity in Russia's Foreign Policy

Authors: Aidana Arynbek

Abstract:

This paper attempts to offer an alternative to the explanation of the politics of great powers in Caspian politics. Since many researchers have analysed the politics of great powers in the region with the focus on materialism, this paper attempts to bring a sociological inquiry into analysing inter-state behaviour. The constructivist concept of Alexander Wendt will be applied to analyse Russia’s relation with The United States, China and Iran; the main argument is emphasis on the power of ideational forces over material ones. Moreover, the innovative contribution of Wendt regarding the understanding of anarchy to the study of International Relations (IR) will be applied; in his words, ‘anarchy is what states make of it’. A neo-realist perspective implies that with the structure of international politics, Russia treats all great powers as rivals through engagement in power politics; however, Wendt’s approach is able to explain the reason behind the state’s behaviour towards power politics, and this is about not only international structure, but also identity. The understanding of identity answers the question of how Russia came about to follow different actions in relation to Iran and China in contrast to The United States. This paper will be divided into five chapters. The first chapter will explain the constructivism of Alexander Wendt; the second chapter will give a brief background to The Caspian Sea Region (CSR); the third chapter will explain the formation of Russia’s identity towards The United States, and this will be applied to analyse Russia’s relation to The U.S in The CSR. Similarly with China, the fourth chapter will explain Russia’s identity and its relations in The CSR, and finally, the fifth chapter will show Russia’s identity towards Iran and its relation to Iran in The CSR. It will be concluded that the analysis of the politics between great powers in seeking to access one of the richest regions, The Caspian Basin, will show that international politics is not fixed, but constructed by human action and cognition. Reality in the politics of great powers in The Caspian Sea Region is socially constructed. This paper is not interested in how things are, but how they became what they are. That is to say, how Russia’s foreign policies towards great powers became what they are.

Keywords: Alexander Wendt, Caspian sea, identity, Russia, socially constructed

Procedia PDF Downloads 273
954 A Case-Study Analysis on the Necessity of Testing for Cyber Risk Mitigation on Maritime Transport

Authors: Polychronis Kapalidis

Abstract:

In recent years, researchers have started to turn their attention to cyber security and maritime security independently, neglecting, in most cases, to examine the areas where these two critical issues are intertwined. The impact of cybersecurity issues on the maritime economy is emerging dramatically. Maritime transport and all related activities are conducted by technology-intensive platforms, which today rely heavily on information systems. The paper’s argument is that when no defense is completely effective against cyber attacks, it is vital to test responses to the inevitable incursions. Hence, preparedness in the form of testing existing cybersecurity structure via different tools for potential attacks is vital for minimizing risks. Traditional criminal activities may further be facilitated and evolved through the misuse of cyberspace. Kidnap, piracy, fraud, theft of cargo and imposition of ransomware are the major of these activities that mainly target the industry’s most valuable asset; the ship. The paper, adopting a case-study analysis, based on stakeholder consultation and secondary data analysis, namely policy and strategic-related documentation, presents the importance of holistic testing in the sector. Arguing that poor understanding of the issue leads to the adoption of ineffective policies the paper will present the level of awareness within the industry and assess the risks and vulnerabilities of ships to these cybercriminal activities. It will conclude by suggesting that testing procedures must be focused on three main pillars within the maritime transport sector: the human factor, the infrastructure, and the procedures.

Keywords: cybercrime, cybersecurity, organized crime, risk mitigation

Procedia PDF Downloads 132
953 Investigating The Use Of Socially Assistive Robots To Support Learner Engagement For Students With Learning Disabilities In One-to-one Instructional Settings

Authors: Jennifer Fane, Mike Gray, Melissa Sager

Abstract:

Children with diagnosed or suspected learning disabilities frequently experience significant skill gaps in foundational learning areas such as reading, writing, and math. Remedial one-to-one instruction is a highly effective means of supporting children with learning differences in building these foundational skills and closing the learning gap between them and their same-age peers. However, due to the learning challenges children with learning disabilities face, and ensuing challenges with self-confidence, many children with learning differences struggle with motivation and self-regulation within remedial one-to-one learning environments - despite the benefits of these sessions. Socially Assistive Robots (SARs) are an innovative educational technology tool that has been trialled in a range of educational settings to support diverse learning needs. Yet, little is known about the impact of SARs on the learning of children with learning differences in a one-to-one remedial instructional setting. This study sought to explore the impact of SARs on the engagement of children (n=9) with learning differences attending one-to-one remedial instruction sessions at a non-profit remedial education provider. The study used a mixed-methods design to explore learner engagement during learning tasks both with and without the use of a SAR to investigate how the use of SARs impacts student learning. The study took place over five weeks, with each session within the study followed the same procedure with the SAR acting as a teaching assistant when in use. Data from the study included analysis of time-sample video segments of the instructional sessions, instructor recorded information about the student’s progress towards their session learning goal and student self-reported mood and energy levels before and after the session. Analysis of the findings indicates that the use of SARs resulted in fewer instances of off-task behaviour and less need for instructor re-direction during learning tasks, allowing students to work in more sustained ways towards their learning goals. This initial research indicates that the use of SARs does have a material and measurable impact on learner engagement for children with learning differences and that further exploration of the impact of SARs during one-to-one remedial instruction is warranted.

Keywords: engagement, learning differences, learning disabilities, instruction, social robotics.

Procedia PDF Downloads 187
952 Moving Target Defense against Various Attack Models in Time Sensitive Networks

Authors: Johannes Günther

Abstract:

Time Sensitive Networking (TSN), standardized in the IEEE 802.1 standard, has been lent increasing attention in the context of mission critical systems. Such mission critical systems, e.g., in the automotive domain, aviation, industrial, and smart factory domain, are responsible for coordinating complex functionalities in real time. In many of these contexts, a reliable data exchange fulfilling hard time constraints and quality of service (QoS) conditions is of critical importance. TSN standards are able to provide guarantees for deterministic communication behaviour, which is in contrast to common best-effort approaches. Therefore, the superior QoS guarantees of TSN may aid in the development of new technologies, which rely on low latencies and specific bandwidth demands being fulfilled. TSN extends existing Ethernet protocols with numerous standards, providing means for synchronization, management, and overall real-time focussed capabilities. These additional QoS guarantees, as well as management mechanisms, lead to an increased attack surface for potential malicious attackers. As TSN guarantees certain deadlines for priority traffic, an attacker may degrade the QoS by delaying a packet beyond its deadline or even execute a denial of service (DoS) attack if the delays lead to packets being dropped. However, thus far, security concerns have not played a major role in the design of such standards. Thus, while TSN does provide valuable additional characteristics to existing common Ethernet protocols, it leads to new attack vectors on networks and allows for a range of potential attacks. One answer to these security risks is to deploy defense mechanisms according to a moving target defense (MTD) strategy. The core idea relies on the reduction of the attackers' knowledge about the network. Typically, mission-critical systems suffer from an asymmetric disadvantage. DoS or QoS-degradation attacks may be preceded by long periods of reconnaissance, during which the attacker may learn about the network topology, its characteristics, traffic patterns, priorities, bandwidth demands, periodic characteristics on links and switches, and so on. Here, we implemented and tested several MTD-like defense strategies against different attacker models of varying capabilities and budgets, as well as collaborative attacks of multiple attackers within a network, all within the context of TSN networks. We modelled the networks and tested our defense strategies on an OMNET++ testbench, with networks of different sizes and topologies, ranging from a couple dozen hosts and switches to significantly larger set-ups.

Keywords: network security, time sensitive networking, moving target defense, cyber security

Procedia PDF Downloads 43
951 Counter-Terrorism and De-Radicalization as Soft Strategies in Combating Terrorism in Indonesia: A Critical Review

Authors: Tjipta Lesmana

Abstract:

Terrorist attacks quickly penetrated Indonesia following the downfall of Soeharto regime in May 1998. Reform era was officially proclaimed. Indonesia turned to 'heaven state' from 'authoritarian state'. For the first time since 1966, the country experienced a full-scale freedom of expression, including freedom of the press, and heavy acknowledgement of human rights practice. Some religious extremists previously run away to neighbor countries to escape from security apparatus secretly backed home. Quickly they consolidated the power to continue their long aspiration and dream to establish 'Shariah Indonesia', Indonesia based on Khilafah ideology. Bali bombings I which shocked world community occurred on 12 October 2002 in the famous tourist district of Kuta on the Indonesian island of Bali, killing 202 people (including 88 Australians, 38 Indonesians, and people from more than 20 other nationalities). In the capital, Jakarta, successive bombings were blasted in Marriott hotel, Australian Embassy, residence of the Philippine Ambassador and stock exchange office. A 'drunken Indonesia' is far from ready to combat nationwide sudden and massive terrorist attacks. Police Detachment 88 (Densus 88) Indonesian counter-terrorism squad, was quickly formed following 2002 Bali Bombing. Anti-terrorism Provisional Act was immediately erected, as well, due to urgent need to fight terrorism. Some Bali bombings criminals were deadly executed after sentenced by the court. But a series of terrorist suicide attacks and another Bali bombings (the second one) in Bali, again, shocked world community. Terrorism network is undoubtedly spreading nationwide. Suspicion is high that they had close connection with Al Qaeda’s groups. Even 'Afghanistan alumni' and 'Syria alumni' returned to Indonesia to back up the local mujahidins in their fights to topple Indonesia constitutional government and set up Islamic state (Khilafah). Supported by massive aids from friendly nations, especially Australia and United States, Indonesia launched large scale operations to crush terrorism consisted of various radical groups such as JAD, JAS, and JAADI. Huge energy, money, and souls were dedicated. Terrorism is, however, persistently entrenched. High ranking officials from Detachment 88 squad and military intelligence believe that terrorism is still one the most deadly enemy of Indonesia.

Keywords: counter-radicalization, de-radicalization, Khalifah, Union State, Al Qaedah, ISIS

Procedia PDF Downloads 152
950 Cybersecurity Challenges in the Era of Open Banking

Authors: Krish Batra

Abstract:

The advent of open banking has revolutionized the financial services industry by fostering innovation, enhancing customer experience, and promoting competition. However, this paradigm shift towards more open and interconnected banking ecosystems has introduced complex cybersecurity challenges. This research paper delves into the multifaceted cybersecurity landscape of open banking, highlighting the vulnerabilities and threats inherent in sharing financial data across a network of banks and third-party providers. Through a detailed analysis of recent data breaches, phishing attacks, and other cyber incidents, the paper assesses the current state of cybersecurity within the open banking framework. It examines the effectiveness of existing security measures, such as encryption, API security protocols, and authentication mechanisms, in protecting sensitive financial information. Furthermore, the paper explores the regulatory response to these challenges, including the implementation of standards such as PSD2 in Europe and similar initiatives globally. By identifying gaps in current cybersecurity practices, the research aims to propose a set of robust, forward-looking strategies that can enhance the security and resilience of open banking systems. This includes recommendations for banks, third-party providers, regulators, and consumers on how to mitigate risks and ensure a secure open banking environment. The ultimate goal is to provide stakeholders with a comprehensive understanding of the cybersecurity implications of open banking and to outline actionable steps for safeguarding the financial ecosystem in an increasingly interconnected world.

Keywords: open banking, financial services industry, cybersecurity challenges, data breaches, phishing attacks, encryption, API security protocols, authentication mechanisms, regulatory response, PSD2, cybersecurity practices

Procedia PDF Downloads 27
949 Effectiveness of the Community Health Assist Scheme in Reducing Market Failure in Singapore’s Healthcare Sector

Authors: Matthew Scott Lau

Abstract:

This study addresses the research question: How effective has the Community Health Assist Scheme (CHAS) been in reducing market failure in Singapore’s healthcare sector? The CHAS policy, introduced in 2012 in Singapore, aims to improve accessibility and affordability of healthcare by offering subsidies to low and middle-income groups and elderly individuals for general practice consultations and healthcare. The investigation was undertaken by acquiring and analysing primary and secondary research data from 3 main sources, including handwritten survey responses of 334 individuals who were valid CHAS subsidy recipients (CHAS cardholders) from 5 different locations in Singapore, interview responses from two established general practitioner doctors with working knowledge of the scheme, and information from literature available online. Survey responses were analysed to determine how CHAS has affected the affordability and consumption of healthcare, and other benefits or drawbacks for CHAS users. The interview responses were used to explain the benefits of healthcare consumption and provide different perspectives on the impacts of CHAS on the various parties involved. Online sources provided useful information on changes in healthcare consumerism and Singapore’s government policies. The study revealed that CHAS has been largely effective in reducing market failure as the subsidies granted to consumers have improved the consumption of healthcare. This has allowed for the external benefits of healthcare consumption to be realized, thus reducing market failure. However, the study also revealed that CHAS cannot be fully effective in reducing market failure as the scope of CHAS prevents healthcare consumption from fully reaching the socially optimal level. Hence, the study concluded that CHAS has been effective to a large extent in reducing market failure in Singapore’s healthcare sector, albeit with some benefits to third parties yet to be realised. There are certain elements of the investigation, which may limit the validity of the conclusion, such as the means used to determine the socially optimal level of healthcare consumption, and the survey sample size.

Keywords: healthcare consumption, health economics, market failure, subsidies

Procedia PDF Downloads 138
948 Prospects of Acellular Organ Scaffolds for Drug Discovery

Authors: Inna Kornienko, Svetlana Guryeva, Natalia Danilova, Elena Petersen

Abstract:

Drug toxicity often goes undetected until clinical trials, the most expensive and dangerous phase of drug development. Both human cell culture and animal studies have limitations that cannot be overcome by improvements in drug testing protocols. Tissue engineering is an emerging alternative approach to creating models of human malignant tumors for experimental oncology, personalized medicine, and drug discovery studies. This new generation of bioengineered tumors provides an opportunity to control and explore the role of every component of the model system including cell populations, supportive scaffolds, and signaling molecules. An area that could greatly benefit from these models is cancer research. Recent advances in tissue engineering demonstrated that decellularized tissue is an excellent scaffold for tissue engineering. Decellularization of donor organs such as heart, liver, and lung can provide an acellular, naturally occurring three-dimensional biologic scaffold material that can then be seeded with selected cell populations. Preliminary studies in animal models have provided encouraging results for the proof of concept. Decellularized Organs preserve organ microenvironment, which is critical for cancer metastasis. Utilizing 3D tumor models results greater proximity of cell culture morphological characteristics in a model to its in vivo counterpart, allows more accurate simulation of the processes within a functioning tumor and its pathogenesis. 3D models allow study of migration processes and cell proliferation with higher reliability as well. Moreover, cancer cells in a 3D model bear closer resemblance to living conditions in terms of gene expression, cell surface receptor expression, and signaling. 2D cell monolayers do not provide the geometrical and mechanical cues of tissues in vivo and are, therefore, not suitable to accurately predict the responses of living organisms. 3D models can provide several levels of complexity from simple monocultures of cancer cell lines in liquid environment comprised of oxygen and nutrient gradients and cell-cell interaction to more advanced models, which include co-culturing with other cell types, such as endothelial and immune cells. Following this reasoning, spheroids cultivated from one or multiple patient-derived cell lines can be utilized to seed the matrix rather than monolayer cells. This approach furthers the progress towards personalized medicine. As an initial step to create a new ex vivo tissue engineered model of a cancer tumor, optimized protocols have been designed to obtain organ-specific acellular matrices and evaluate their potential as tissue engineered scaffolds for cultures of normal and tumor cells. Decellularized biomatrix was prepared from animals’ kidneys, urethra, lungs, heart, and liver by two decellularization methods: perfusion in a bioreactor system and immersion-agitation on an orbital shaker with the use of various detergents (SDS, Triton X-100) in different concentrations and freezing. Acellular scaffolds and tissue engineered constructs have been characterized and compared using morphological methods. Models using decellularized matrix have certain advantages, such as maintaining native extracellular matrix properties and biomimetic microenvironment for cancer cells; compatibility with multiple cell types for cell culture and drug screening; utilization to culture patient-derived cells in vitro to evaluate different anticancer therapeutics for developing personalized medicines.

Keywords: 3D models, decellularization, drug discovery, drug toxicity, scaffolds, spheroids, tissue engineering

Procedia PDF Downloads 272
947 Degradation Kinetics of Cardiovascular Implants Employing Full Blood and Extra-Corporeal Circulation Principles: Mimicking the Human Circulation In vitro

Authors: Sara R. Knigge, Sugat R. Tuladhar, Hans-Klaus HöFfler, Tobias Schilling, Tim Kaufeld, Axel Haverich

Abstract:

Tissue engineered (TE) heart valves based on degradable electrospun fiber scaffold represent a promising approach to overcome the known limitations of mechanical or biological prostheses. But the mechanical stress in the high-pressure system of the human circulation is a severe challenge for the delicate materials. Hence, the prediction of the scaffolds` in vivo degradation kinetics must be as accurate as possible to prevent fatal events in future animal or even clinical trials. Therefore, this study investigates whether long-term testing in full blood provides more meaningful results regarding the degradation behavior than conventional tests in simulated body fluids (SBF) or Phosphate Buffered Saline (PBS). Fiber mats were produced from a polycaprolactone (PCL)/tetrafluoroethylene solution by electrospinning. The morphology of the fiber mats was characterized via scanning electron microscopy (SEM). A maximum physiological degradation environment utilizing a test set-up with porcine full blood was established. The set-up consists of a reaction vessel, an oxygenator unit, and a roller pump. The blood parameters (pO2, pCO2, temperature, and pH) were monitored with an online test system. All tests were also carried out in the test circuit with SBF and PBS to compare conventional degradation media with the novel full blood setting. The polymer's degradation is quantified by SEM picture analysis, differential scanning calorimetry (DSC), and Raman spectroscopy. Tensile and cyclic loading tests were performed to evaluate the mechanical integrity of the scaffold. Preliminary results indicate that PCL degraded slower in full blood than in SBF and PBS. The uptake of water is more pronounced in the full blood group. Also, PCL preserved its mechanical integrity longer when degraded in full blood. Protein absorption increased during the degradation process. Red blood cells, platelets, and their aggregates adhered on the PCL. Presumably, the degradation led to a more hydrophilic polymeric surface which promoted the protein adsorption and the blood cell adhesion. Testing degradable implants in full blood allows for developing more reliable scaffold materials in the future. Material tests in small and large animal trials thereby can be focused on testing candidates that have proven to function well in an in-vivo-like setting.

Keywords: Electrospun scaffold, full blood degradation test, long-term polymer degradation, tissue engineered aortic heart valve

Procedia PDF Downloads 124
946 Violence in the School Environment: When the Teenager Encounters the Threat of Depression

Authors: Ndje Ndje Mireille

Abstract:

For some years in Cameroon, there has been an increase in violence in schools. This violence has gone from verbal to physical, sometimes going as far as murder. At the centre of this violence, we find the student who is a teenager in the midst of both physical and psychological changes. The unpredictable transformations of his body, the unexpected emotions arrouse when he encouters someonelse, intrusion, shortcomings, boredom, loneliness and self-deception are the threats to which the teenager faces daily. From the psychopathological point of view, the greatest threat in adolesence is probably the depresive threat. During adolescence and for several resons, the subject is confronted with the self image. He displays certantity which sometimes hides great uncertaintity about what leads him to manifest some particular behaviours or undertake certain actions. Faced with aggressiveness twards those he confronts, he feels more or less guilt. This can lead a certain number of adolescents to feel heplessness faced to their vis-à-vis, faced to life. This helplessness is sometimes reinforced by the social, cultural and economic context in which they are. The teeneger then feels threatens by this depression which, when it reaches its extreme, it is manifested by the feeling that he can no longer do anything. Generally, the depressive threats manifest itself in defensive forms vis-à-vis with the depression itself. Reason why, it is indeed a threat and not a threshold already crossed. This threat often manifests itself in inappropriate forms of attack on one’s own body as seen in a number of repetitive risky behaviours. We also see teenegers confront peers and even adults through physical attacks and often go as far as murder. All these behaviours appears as an absurd way of attacking and at the same time confronting the feeling of remaining alive. This depressive threats can also be expressed in forms of attacks on an individual’s thinking abilities or more explicitely in the form of accademic downfall. The depressive threats does not sum up all the problems of adolescence, but, undoubtly represents currently, one of the deepest form of unease adolescents face.

Keywords: violence, school, depression threats, adolescent, behavior

Procedia PDF Downloads 64
945 Membrane Spanning DNA Origami Nanopores for Protein Translocation

Authors: Genevieve Pugh, Johnathan Burns, Stefan Howorka

Abstract:

Single-molecule sensing via protein nanopores has achieved a step-change in portable and label-free DNA sequencing. However, protein pores of both natural or engineered origin are not able to produce the tunable diameters needed for effective protein sensing. Here, we describe a generic strategy to build synthetic DNA nanopores that are wide enough to accommodate folded protein. The pores are composed of interlinked DNA duplexes and carry lipid anchors to achieve the required membrane insertion. Our demonstrator pore has a contiguous cross-sectional channel area of 50 nm2 which is 6-times larger than the largest protein pore. Consequently, transport of folded protein across bilayers is possible. The modular design is amenable for different pore dimensions and can be adapted for protein sensing or to create molecular gates in synthetic biology.

Keywords: biosensing, DNA nanotechnology, DNA origami, nanopore sensing

Procedia PDF Downloads 295
944 Conspiracy Theories and the Right to Believe

Authors: Zwelenkani Mdlalose

Abstract:

From the moment Covid 19 was declared a pandemic it became clear that conspiracy theories would significantly impact our response to the crisis that the virus was to become. Central to the interest in conspiracy theories evoked by a pandemic is a more general concern for the impact they have on society and social harmony. The specific brand of Conspiracy Theory that is in question is not any and all theories about conspiracies but rather those conspiracy theories which contradict official accounts. For example, where the official account on the terrorist attacks of September 11 2001 is of a conspiracy involving 19 militants associated with the Islamic extremist group al-Qaeda against targets in the United States, the nature of conspiracy theory under study is the one contradicting this official account to the extent that its attributes the attacks not to al-Qaeda militants but to actors in the United States government itself. The study is not an investigation into the truth value of conspiracy theories but rather an attempt at observing the essential qualities of the type of belief that is belief in conspiracy theories compared to belief in official accounts provided by authoritative sources such as governments, experts and mainstream media. These qualities include the psychological, epistemic and socio-political foundations on which belief in conspiracy theories are established. Based on a foundational understanding of the sort of belief that are beliefs in conspiracy theories, we may then extrapolate implied ethical demands on both authoritative bodies and actors as well as believers in conspiracy theories. For example: in their unofficial ‘non-factual’ status, is there not some violation of epistemic right in the same way we observe in cases where people are prejudiced because of their religious beliefs? In other words, is there an epistemic injustice suffered by believers in conspiracy theories in the way their beliefs are rejected as illegitimate? Conversely, to what extent do believers bear an epistemic responsibility in their adoption of their beliefs in conspiracy theories. From this position, perhaps we can then develop responses to the problem that foster greater social harmony even in the midst of suspicion and distrust.

Keywords: conspiracy theories, subjugated knowledge, epistemic injustice, epistemic responsibility

Procedia PDF Downloads 75
943 The Instruction of Imagination: A Theory of Language as a Social Communication Technology

Authors: Daniel Dor

Abstract:

The research presents a new general theory of language as a socially-constructed communication technology, designed by cultural evolution for a very specific function: the instruction of imagination. As opposed to all the other systems of intentional communication, which provide materials for the interlocutors to experience, language allows speakers to instruct their interlocutors in the process of imagining the intended meaning-instead of experiencing it. It is thus the only system that bridges the experiential gaps between speakers. This is the key to its enormous success.

Keywords: experience, general theory of language, imagination, language as technology, social essence of language

Procedia PDF Downloads 558
942 An Approach towards Intelligent Urbanism in New Communities

Authors: Sherine Shafik Aly, Farida Ahmed El Mallah

Abstract:

Technology is a quoted keyword nowadays in all fields; it has been recently thought of and integrated into urban development. This research explains the role of technology in establishing intelligent urbanism to create a convivial and sustainable environment for people to live in. Cities are downgrading socially, economically and environmentally. A framework is to be developed where these three pillars are involved in the planning, design, and spreading of technology to create convivial environments. The aim of this research is achieved by highlighting the importance and approaches of intelligent urbanism, it’s characteristics and principles, then analyzing some relevant examples to achieve a set of guidelines.

Keywords: convivial, intelligent, technology, urban development

Procedia PDF Downloads 225
941 Poly(ε-Caprolactone)-Based Bilayered Scaffolds Prepared by Electrospinning for Tissue Engineering of Small-Diameter Vascular Grafts

Authors: Mohammed Fayez Al Rez

Abstract:

Nowadays, there is an unmet clinical need for new small-diameter vascular grafts to overcome the drawbacks of traditional methods used for treatment of widespread cardiovascular diseases. Vascular tissue engineering (VTE) is a promising approach that can be utilized to develop viable vascular grafts by in vitro seeding of functional cells onto a scaffold allowing them to attach, proliferate and differentiate. To achieve this purpose, the scaffold should provide cells with the initial necessary extracellular matrix environment and structure until being able to reconstruct the required vascular tissue. Therefore, producing scaffolds with suitable features is crucial for guiding cells properly to develop the desired tissue-engineered vascular grafts for clinical applications. The main objective of this work is fabrication and characterization of tubular small-diameter ( < 6 mm) bilayered scaffolds for VTE. The scaffolds were prepared via mixing electrospinning approach of biodegradable poly(ε-caprolactone) (PCL) polymer – due to its favorable physicochemical properties – to mimic the natural environment-extracellular matrix. Firstly, tubular nanofibrous construct with inner diameter of 3, 4 or 5 mm was electrospun as inner layer, and secondly, microfibrous construct was electrospun as outer layer directly on the first produced inner layer. To improve the biological properties of PCL, a group of the electrospun scaffolds was immersed in type-1 collagen solution. The morphology and structure of the resulting fibrous scaffolds were investigated by scanning electron microscope. The electrospun nanofibrous inner layer contained fibers measuring 219±35 nm in diameter, while the electrospun microfibrous outer layer contained fibers measuring 1011 ± 150 nm. Furthermore, mechanical, thermal and physical tests were conducted with both electrospun bilayered scaffold types where revealed improved properties. Biological investigations using endothelial, smooth muscle and fibroblast cell line showed good biocompatibility of both tested electrospun scaffolds. Better attachment and proliferation were obviously found when cells were cultured on the scaffolds immersed with collagen due to increasing the hydrophilicity of the PCL. The easy, inexpensive and versatile electrospinning approach used in this work was able to successfully produce double layered tubular elastic structures containing both nanofibers and microfibers to imitate the native vascular structure. The PCL – as a suitable and approved biomaterial for many biomedical and tissue engineering applications – can ensure favorable mechanical properties of scaffolds used for VTE. The VTE approach using electrospun bilayered scaffolds offers optimal solutions and holds significant promises for treatment of many cardiovascular diseases.

Keywords: electrospinning, poly(ε-caprolactone) (PCL), tissue-engineered vascular graft, tubular bilayered scaffolds, vascular cells

Procedia PDF Downloads 268
940 Deploying a Transformative Learning Model in Technological University Dublin to Assess Transversal Skills

Authors: Sandra Thompson, Paul Dervan

Abstract:

Ireland’s first Technological University (TU Dublin) was established on 1st January 2019, and its creation is an exciting new milestone in Irish Higher Education. TU Dublin is now Ireland’s biggest University supporting 29,000 students across three campuses with 3,500 staff. The University aspires to create work-ready graduates who are socially responsible, open-minded global thinkers who are ambitious to change the world for the better. As graduates, they will be enterprising and daring in all their endeavors, ready to play their part in transforming the future. Feedback from Irish employers and students coupled with evidence from other authoritative sources such as the World Economic Forum points to a need for greater focus on the development of students’ employability skills as they prepare for today’s work environment. Moreover, with an increased focus on Universal Design for Learning (UDL) and inclusiveness, there is recognition that students are more than a numeric grade value. Robust grading systems have been developed to track a student’s performance around discipline knowledge but there is little or no global consensus on a definition of transversal skills nor on a unified framework to assess transversal skills. Education and industry sectors are often assessing one or two skills, and some are developing their own frameworks to capture the learner’s achievement in this area. Technological University Dublin (TU Dublin) have discovered and implemented a framework to allow students to develop, assess and record their transversal skills using transformative learning theory. The model implemented is an adaptation of Student Transformative Learning Record - STLR which originated in the University of Central Oklahoma (UCO). The purpose of this paper therefore, is to examine the views of students, staff and employers in the context of deploying a Transformative Learning model within the University to assess transversal skills. It will examine the initial impact the transformative learning model is having socially, personally and on the University as an organization. Crucially also, to identify lessons learned from the deployment in order to assist other Universities and Higher Education Institutes who may be considering a focused adoption of Transformative Learning to meet the challenge of preparing students for today’s work environment.

Keywords: assessing transversal skills, higher education, transformative learning, students

Procedia PDF Downloads 108
939 A Comprehensive Approach to Create ‘Livable Streets’ in the Mixed Land Use of Urban Neighborhoods Applying Urban Design Principles Which Will Achieve Quality of Life for Pedestrians

Authors: K. C. Tanuja, Mamatha P. Raj

Abstract:

Urbanisation is happening rapidly all over the world. As population increasing in the urban settlements, its required to provide quality of life to all the inhabitants who live in. Urban design is a place making strategic planning. Urban design principles promote visualising any place environmentally, socially and economically viable. Urban design strategies include building mass, transit development, economic viability and sustenance and social aspects.

Keywords: livable streets, social interaction, pedestrian use, urban design

Procedia PDF Downloads 208
938 Investigating the Role of Combined Length Scale Effect on the Mechanical Properties of Ni/Cu Multilayer Structures

Authors: Naresh Radaliyagoda, Nigel M. Jennett, Rong Lan, David Parfitt

Abstract:

A series of length scale engineered multilayer material with temperature robust mechanical properties has been suggested. A range of polycrystalline copper sub-layers with the thickness varying from 1 to 25μm and buried in between two nickel layers was produced using electrodeposition dual bath technique. The structure of the multilayers was characterized using Electron Backscatter Diffraction and Scanning Electron Microscope. The interface effect on the hardness and elastic modulus was tested using Nano-indentation. Results of the grain size and layer thickness measurements, and indentation hardness have been compared. It is found that there is a combined length scale effect that improves mechanical properties in Ni/Cu multilayer structures.

Keywords: nano-indentation, size effect, multilayers, electrodeposition

Procedia PDF Downloads 121
937 A Goal-Oriented Social Business Process Management Framework

Authors: Mohammad Ehson Rangiha, Bill Karakostas

Abstract:

Social Business Process Management (SBPM) promises to overcome limitations of traditional BPM by allowing flexible process design and enactment through the involvement of users from a social community. This paper proposes a meta-model and architecture for socially driven business process management systems. It discusses the main facets of the architecture such as goal-based role assignment that combines social recommendations with user profile, and process recommendation, through a real example of a charity organization.

Keywords: business process management, goal-based modelling, process recommendation social collaboration, social BPM

Procedia PDF Downloads 468
936 Belonging in South Africa: Networks among African Immigrants and South African Natives

Authors: Efe Mary Isike

Abstract:

The variety of relationships between migrants and host communities is an enduring theme of migration studies. On one extreme, there are numerous examples of hostility towards ‘strangers’ who are either ejected from society or denied access to jobs, housing, education, healthcare and other aspects of normal life. More moderate treatments of those identified as different include expectations of assimilation in which host communities expect socially marginalized groups to conform to norms that they define. Both exclusion and assimilation attempt to manage the problem of difference by removing it. South Africa experienced great influx of African immigrants who worked in mines and farms under harsh and exploitative conditions before and after the institutionalization of apartheid. Although these labour migrants contributed a great deal to the economic development of South Africa, they were not given citizenship status. The formal democratization in 1994 came with dreams and expectations of a more inclusive South Africa, where black South Africans hoped to maximize their potential in a more free, fair and equal society. In the same vein, it also opened spaces for an influx of especially African immigrants into the country which set the stage for a new form of contest for belonging between South African citizens and African migrant settlers. One major manifestation of this contest was the violent xenophobic attacks against African immigrants which predate that of May 2008 and has continued with lower intensity across the country since then. While it is doubtless possible to find abundant evidence of antagonism in the relations between South Africans and African immigrants, the purpose of this study is to investigate the everyday realities of migrants in ordinary places who interact with a variety of people through their livelihood activities, marriages and social relationships, moving around towns and cities, in their residential areas, in faith-based organizations and other elements of everyday life. Rather than assuming all relations are hostile, this study intends to look at the breadth of everyday relationships within a specific context. Based on the foregoing, the main task of this study is to holistically examine and explain the nature of interactions between African migrants and South African citizens by analysing the social network ties that connect them in the specific case of Umhlathuze municipality. It will also investigate the variety of networks that exists between African migrants and South Africans and examine the nature of the linkages in the various networks identified between these two groups in Umhlathuze Municipality. Apart from a review of relevant literature, policies and other official documents, this paper will employ a purposive sample survey and in-depth interview of African immigrants and South Africans within their networks in selected suburbs in KwaZulu-Natal.

Keywords: migration, networks, development, host communities

Procedia PDF Downloads 255
935 RNA Interference Technology as a Veritable Tool for Crop Improvement and Breeding for Biotic Stress Resistance

Authors: M. Yusuf

Abstract:

The recent discovery of the phenomenon of RNA interference has led to its application in various aspects of plant improvement. Crops can be modified by engineering novel RNA interference pathways that create small RNA molecules to alter gene expression in crops or plant pests. RNA interference can generate new crop quality traits or provide protection against insects, nematodes and pathogens without introducing new proteins into food and feed products. This is an advantage in contrast with conventional procedures of gene transfer. RNA interference has been used to develop crop varieties resistant to diseases, pathogens and insects. Male sterility has been engineered in plants using RNA interference. Better quality crops have been developed through the application of RNA interference etc. The objective of this paper is to highlight the application of RNA interference in crop improvement and to project its potential future use to solve problems of agricultural production in relation to plant breeding.

Keywords: RNA interference, application, crop Improvement, agricultural production

Procedia PDF Downloads 396
934 Effects of an Inclusive Educational Model for Students with High Intellectual Capacity and Special Educational Needs: A Case Study in Talentos UdeC, Chile

Authors: Gracia V. Navarro, María C. González, María G. González, María V. González

Abstract:

In Chile, since 2002, there are extracurricular enrichment programs complementary to regular education for students with high intellectual capacity. This paper describes a model for the educational inclusion of students, with special educational needs associated with high intellectual capacity, developed at the University of Concepción and its effects on its students, academics and undergraduate students that collaborate with the program. The Talentos UdeC Program was created in 2003 and is intended for 240 children and youth from 11 to 18 years old, from 15 communes of the Biobio region. The case Talentos UdeC is analyzed from a mixed qualitative study in which those participating in the educational model are considered. The sample was composed of 30 students, 30 academics, and 30 undergraduate students. In the case of students, pre and post program measurements were made to analyze their socio-emotional adaptation, academic motivation and socially responsible behavior. The mentioned variables are measured through questionnaires designed and validated by the University of Concepcion that included: The Socially Responsible Behavior Questionnaire (CCSR); the Academic Motivation Questionnaire (CMA) and the Socio-Emotional Adaptation Questionnaire (CASE). The information obtained by these questionnaires was analyzed through a quantitative analysis. Academics and undergraduate students were interviewed to learn their perception of the effects of the program on themselves, on students and on society. The information obtained is analyzed using qualitative analysis based on the identification of common themes and descriptors for the construction of conceptual categories of answers. Quantitative results show differences in the first three variables analyzed in the students, after their participation for two years in Talentos UdeC. Qualitative results demonstrate perception of effects in the vision of world, project of life and in other areas of the students’ development; perception of effects in a personal, professional and organizational plane by academics and a perception of effects in their personal-social development and training in generic competencies by undergraduates students.

Keywords: educational model, high intellectual capacity, inclusion, special educational needs

Procedia PDF Downloads 189
933 A Vertical Grating Coupler with High Efficiency and Broadband Operation

Authors: Md. Asaduzzaman

Abstract:

A Silicon-on-insulator (SOI) perfectly vertical fibre-to-chip grating coupler is proposed and designed based on engineered subwavelength structures. The high directionality of the coupler is achieved by implementing step gratings to realize asymmetric diffraction and by applying effective index variation with auxiliary ultra-subwavelength gratings. The proposed structure is numerically analysed by using two-dimensional Finite Difference Time Domain (2D FDTD) method and achieves 96% (-0.2 dB) coupling efficiency and 39 nm 1-dB bandwidth. This highly efficient GC is necessary for applications where coupling efficiency between the optical fibre and nanophotonics waveguide is critically important, for instance, experiments of the quantum photonics integrated circuits. Such efficient and broadband perfectly vertical grating couplers are also significantly advantageous in highly dense photonic packaging.

Keywords: diffraction grating, FDTD, grating couplers, nanophotonic

Procedia PDF Downloads 44
932 The Tense Dichotomy Between Shari'ah Compliance and the Goals of an Economic Bank

Authors: Camille Paldi

Abstract:

The tense dichotomy between Shari’ah compliance and the economic goals of an Islamic Bank produces a proliferation of reverse engineered products, which are barely in compliance with Islamic law. The result is basically a hybrid conventional banking system with conventional products in Islamic disguise using Arabic and Islamic terminology. Many Islamic financial professionals and academics advocate for the use of conventional products and devices despite their non-Shari’ah compliance based on commercial necessity and the need to compete. However, this dangerous trend will lead to the demise of the Islamic finance industry. Rather than thoughtlessly following conventional products and practice, Islamic finance professionals should delve into the Shari’ah to find the answers to the current Islamic banking conundrum and lead the industry on the right path of developing Shari’ah based products and using Shari’ah devices to hedge risk.

Keywords: Islamic banking, Shari'ah, finance, investment

Procedia PDF Downloads 324
931 Detecting Hate Speech And Cyberbullying Using Natural Language Processing

Authors: Nádia Pereira, Paula Ferreira, Sofia Francisco, Sofia Oliveira, Sidclay Souza, Paula Paulino, Ana Margarida Veiga Simão

Abstract:

Social media has progressed into a platform for hate speech among its users, and thus, there is an increasing need to develop automatic detection classifiers of offense and conflicts to help decrease the prevalence of such incidents. Online communication can be used to intentionally harm someone, which is why such classifiers could be essential in social networks. A possible application of these classifiers is the automatic detection of cyberbullying. Even though identifying the aggressive language used in online interactions could be important to build cyberbullying datasets, there are other criteria that must be considered. Being able to capture the language, which is indicative of the intent to harm others in a specific context of online interaction is fundamental. Offense and hate speech may be the foundation of online conflicts, which have become commonly used in social media and are an emergent research focus in machine learning and natural language processing. This study presents two Portuguese language offense-related datasets which serve as examples for future research and extend the study of the topic. The first is similar to other offense detection related datasets and is entitled Aggressiveness dataset. The second is a novelty because of the use of the history of the interaction between users and is entitled the Conflicts/Attacks dataset. Both datasets were developed in different phases. Firstly, we performed a content analysis of verbal aggression witnessed by adolescents in situations of cyberbullying. Secondly, we computed frequency analyses from the previous phase to gather lexical and linguistic cues used to identify potentially aggressive conflicts and attacks which were posted on Twitter. Thirdly, thorough annotation of real tweets was performed byindependent postgraduate educational psychologists with experience in cyberbullying research. Lastly, we benchmarked these datasets with other machine learning classifiers.

Keywords: aggression, classifiers, cyberbullying, datasets, hate speech, machine learning

Procedia PDF Downloads 198