Search results for: socially engineered attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1258

Search results for: socially engineered attacks

1018 Developing a Tissue-Engineered Aortic Heart Valve Based on an Electrospun Scaffold

Authors: Sara R. Knigge, Sugat R. Tuladhar, Alexander Becker, Tobias Schilling, Birgit Glasmacher

Abstract:

Commercially available mechanical or biological heart valve prostheses both tend to fail long-term due to thrombosis, calcific degeneration, infection, or immunogenic rejection. Moreover, these prostheses are non-viable and do not grow with the patients, which is a problem for young patients. As a result, patients often need to undergo redo-operations. Tissue-engineered (TE) heart valves based on degradable electrospun fiber scaffolds represent a promising approach to overcome these limitations. Such scaffolds need sufficient mechanical properties to withstand the hydrodynamic stress of intracardiac hemodynamics. Additionally, the scaffolds should be colonized by autologous or homologous cells to facilitate the in vivo remodeling of the scaffolds to a viable structure. This study investigates how process parameters of electrospinning and degradation affect the mechanical properties of electrospun scaffolds made of FDA-approved, biodegradable polymer polycaprolactone (PCL). Fiber mats were produced from a PCL/tetrafluoroethylene solution by electrospinning. The e-spinning process was varied in terms of scaffold thickness, fiber diameter, fiber orientation, and fiber interconnectivity. The morphology of the fiber mats was characterized with a scanning electron microscope (SEM). The mats were degraded in different solutions (cell culture media, SBF, PBS and 10 M NaOH-Solution). At different time points of degradation (2, 4 and 6 weeks), tensile and cyclic loading tests were performed. Fresh porcine pericardium and heart valves served as a control for the mechanical assessment. The progression of polymer degradation was quantified by SEM and differential scanning calorimetry (DSC). Primary Human aortic endothelial cells (HAECs) and Human induced pluripotent stem cell-derived endothelial cells (iPSC-ECs) were seeded on the fiber mats to investigate the cell colonization potential. The results showed that both the electrospinning parameters and the degradation significantly influenced the mechanical properties. Especially the fiber orientation has a considerable impact and leads to a pronounced anisotropic behavior of the scaffold. Preliminary results showed that the polymer became strongly more brittle over time. However, the embrittlement can initially only be detected in the mechanical test. In the SEM and DSC investigations, neither morphological nor thermodynamic changes are significantly detectable. Live/Dead staining and SEM imaging of the cell-seeded scaffolds showed that HAECs and iPSC-ECs were able to grow on the surface of the polymer. In summary, this study's results indicate a promising approach to the development of a TE aortic heart valve based on an electrospun scaffold.

Keywords: electrospun scaffolds, long-term polymer degradation, mechanical behavior of electrospun PCL, tissue engineered aortic heart valve

Procedia PDF Downloads 113
1017 Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management

Authors: M. Moslehpour, S. Khorsandi

Abstract:

As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.

Keywords: CGA, ICMPv6, IPv6, malicious node, modifier, NDP, overall load, SEND, trust management

Procedia PDF Downloads 157
1016 Hybridization of Mathematical Transforms for Robust Video Watermarking Technique

Authors: Harpal Singh, Sakshi Batra

Abstract:

The widespread and easy accesses to multimedia contents and possibility to make numerous copies without loss of significant fidelity have roused the requirement of digital rights management. Thus this problem can be effectively solved by Digital watermarking technology. This is a concept of embedding some sort of data or special pattern (watermark) in the multimedia content; this information will later prove ownership in case of a dispute, trace the marked document’s dissemination, identify a misappropriating person or simply inform user about the rights-holder. The primary motive of digital watermarking is to embed the data imperceptibly and robustly in the host information. Extensive counts of watermarking techniques have been developed to embed copyright marks or data in digital images, video, audio and other multimedia objects. With the development of digital video-based innovations, copyright dilemma for the multimedia industry increases. Video watermarking had been proposed in recent years to serve the issue of illicit copying and allocation of videos. It is the process of embedding copyright information in video bit streams. Practically video watermarking schemes have to address some serious challenges as compared to image watermarking schemes like real-time requirements in the video broadcasting, large volume of inherently redundant data between frames, the unbalance between the motion and motionless regions etc. and they are particularly vulnerable to attacks, for example, frame swapping, statistical analysis, rotation, noise, median and crop attacks. In this paper, an effective, robust and imperceptible video watermarking algorithm is proposed based on hybridization of powerful mathematical transforms; Fractional Fourier Transform (FrFT), Discrete Wavelet transforms (DWT) and Singular Value Decomposition (SVD) using redundant wavelet. This scheme utilizes various transforms for embedding watermarks on different layers by using Hybrid systems. For this purpose, the video frames are portioned into layers (RGB) and the watermark is being embedded in two forms in the video frames using SVD portioning of the watermark, and DWT sub-band decomposition of host video, to facilitate copyright safeguard as well as reliability. The FrFT orders are used as the encryption key that allows the watermarking method to be more robust against various attacks. The fidelity of the scheme is enhanced by introducing key generation and wavelet based key embedding watermarking scheme. Thus, for watermark embedding and extraction, same key is required. Therefore the key must be shared between the owner and the verifier via some safe network. This paper demonstrates the performance by considering different qualitative metrics namely Peak Signal to Noise ratio, Structure similarity index and correlation values and also apply some attacks to prove the robustness. The Experimental results are presented to demonstrate that the proposed scheme can withstand a variety of video processing attacks as well as imperceptibility.

Keywords: discrete wavelet transform, robustness, video watermarking, watermark

Procedia PDF Downloads 206
1015 The Neurofunctional Dissociation between Animal and Tool Concepts: A Network-Based Model

Authors: Skiker Kaoutar, Mounir Maouene

Abstract:

Neuroimaging studies have shown that animal and tool concepts rely on distinct networks of brain areas. Animal concepts depend predominantly on temporal areas while tool concepts rely on fronto-temporo-parietal areas. However, the origin of this neurofunctional distinction for processing animal and tool concepts remains still unclear. Here, we address this question from a network perspective suggesting that the neural distinction between animals and tools might reflect the differences in their structural semantic networks. We build semantic networks for animal and tool concepts derived from McRae and colleagues’s behavioral study conducted on a large number of participants. These two networks are thus analyzed through a large number of graph theoretical measures for small-worldness: centrality, clustering coefficient, average shortest path length, as well as resistance to random and targeted attacks. The results indicate that both animal and tool networks have small-world properties. More importantly, the animal network is more vulnerable to targeted attacks compared to the tool network a result that correlates with brain lesions studies.

Keywords: animals, tools, network, semantics, small-worls, resilience to damage

Procedia PDF Downloads 513
1014 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 141
1013 The Causes and Consequences of Anti-muslim Prejudice: Evidence from a National Scale Longitudinal Study in New Zealand

Authors: Aarif Rasheed, Joseph Bulbulia

Abstract:

Western democracies exhibit signs of distinctive anti-Muslim prejudice, but little is known about its causes and effects on Muslim minorities. Here, drawing on nine years of responses from a nationally representative longitudinal sample of New Zealanders (New Zealand Attitudes and Values Study, N > 31,000), we systematically investigate the demographic and ideological predictors of factors that predict both positive and negative change in Muslim attitudes. First, we find that that education, moderate and liberal political ideology, and positive views about religion predict greater Muslim acceptance. Second, we find a there though there is a general trend for increasing acceptance over nine years, we find evidence of increasing extremism at the margins. Third, focusing on the Muslim sub-sample and comparing it to other religious sub-groups, we find substantially higher reports of perceived anti-religious prejudice. Collectively, these results point to serious challenges to the health of New Zealand as a democracy where people can worship freely without discrimination. Finally, we find consistency in our responses with the reported experiences of victims of the Christchurch attacks, in terms of harassment, assault, slurs, and other hostile behaviour both before and after the attacks.

Keywords: democracy, longitudinal, Muslim, panel data, prejudice

Procedia PDF Downloads 106
1012 Sharing Personal Information for Connection: The Effect of Social Exclusion on Consumer Self-Disclosure to Brands

Authors: Jiyoung Lee, Andrew D. Gershoff, Jerry Jisang Han

Abstract:

Most extant research on consumer privacy concerns and their willingness to share personal data has focused on contextual factors (e.g., types of information collected, type of compensation) that lead to consumers’ personal information disclosure. Unfortunately, the literature lacks a clear understanding of how consumers’ incidental psychological needs may influence consumers’ decisions to share their personal information with companies or brands. In this research, we investigate how social exclusion, which is an increasing societal problem, especially since the onset of the COVID-19 pandemic, leads to increased information disclosure intentions for consumers. Specifically, we propose and find that when consumers become socially excluded, their desire for social connection increases, and this desire leads to a greater willingness to disclose their personal information with firms. The motivation to form and maintain interpersonal relationships is one of the most fundamental human needs, and many researchers have found that deprivation of belongingness has negative consequences. Given the negative effects of social exclusion and the universal need to affiliate with others, people respond to exclusion with a motivation for social reconnection, resulting in various cognitive and behavioral consequences, such as paying greater attention to social cues and conforming to others. Here, we propose personal information disclosure as another form of behavior that can satisfy such social connection needs. As self-disclosure can serve as a strategic tool in creating and developing social relationships, those who have been socially excluded and thus have greater social connection desires may be more willing to engage in self-disclosure behavior to satisfy such needs. We conducted four experiments to test how feelings of social exclusion can influence the extent to which consumers share their personal information with brands. Various manipulations and measures were used to demonstrate the robustness of our effects. Through the four studies, we confirmed that (1) consumers who have been socially excluded show greater willingness to share their personal information with brands and that (2) such an effect is driven by the excluded individuals’ desire for social connection. Our findings shed light on how the desire for social connection arising from exclusion influences consumers’ decisions to disclose their personal information to brands. We contribute to the consumer disclosure literature by uncovering a psychological need that influences consumers’ disclosure behavior. We also extend the social exclusion literature by demonstrating that exclusion influences not only consumers’ choice of products but also their decision to disclose personal information to brands.

Keywords: consumer-brand relationship, consumer information disclosure, consumer privacy, social exclusion

Procedia PDF Downloads 70
1011 The ‘Othered’ Body: Deafness and Disability in Nina Raine’s Tribes

Authors: Nurten Çelik

Abstract:

Under the new developments in science, medicine, sociology, psychology and literary theories, body studies has gained huge importance and the body has become a debatable issue. There has emerged, among sociologists and literary theorists, an overwhelming consensus that body is socially, politically and culturally perceived and constructed and thus, the position of an individual in the society is determined in accordance with his/her body image. In this regard, the most complicated point is the theoretical views propounded upon disability studies, where the disabled body is considered to be a site upon which social and political restrictions as well as repressions are inscribed. There has been the widely-accepted view that no matter what kind of disability it is, those with physical, mental or learning impairments face varied social, political and environmental obstacles that prevent them from being an active citizen, worker, lover and even a family member. In parallel with these approaches, the matter of the sufferings of disabled individuals attains its place in cinema and literature as well as in theatre studies under the category of disability theatre. One of the prominent plays that deal with physical disability came from the contemporary British playwright Nina Raine. In her awarded play Tribes, which premiered at the Royal Court Theatre in 2010, Raine develops the social strata where her deaf protagonist, Billy, caught up between two tribes – namely his family and his lover Slyvia, a member of the deaf community– experiences personal and social hardships due to his hearing impairment. In the play, intransigent and self-opinionated family members foster no sense of empathy towards Billy, there are noisy talking and shouting, but no communication, love, compassion or mutual understanding, and language becomes just a tool for the expression of rage and oppression. In the disordered atmosphere of the family life, Billy experiences isolation and loneliness. Billy’s hopes for success and love are destroyed when Slyvia, troubled between hearing and deafness, rejects him because she does not utterly grasp what Billy is experiencing. Drawing upon the hardships, Billy undergoes in his relationships with his family and his girlfriend, Tribes problematizes the concept of deafness and explores to what extent a deaf person can find a place in the hearing world. Setting ‘the disabled’ bodies against ‘the abled’ bodies in a family, a microcosm of the society where bodies are socially shaped and constructed, Tribes dramatizes how the disabled bodies are disenfranchised, stigmatised, marginalized and othered on the grounds that they are socially misfit. Tribes, with a specific focus on the dysfunctional family, shows that the lack of communication and empathy numbs the characters to the feelings of each other and thereby, they become more disabled than Billy. In conclusion, this paper, with the reference to the embodiment of disability and social theories, aims to explore how disabled bodies are socially marked and segregated from family and society.

Keywords: body, deafness, disability, disability theatre, Nina Raine, tribes

Procedia PDF Downloads 212
1010 An Improved Method on Static Binary Analysis to Enhance the Context-Sensitive CFI

Authors: Qintao Shen, Lei Luo, Jun Ma, Jie Yu, Qingbo Wu, Yongqi Ma, Zhengji Liu

Abstract:

Control Flow Integrity (CFI) is one of the most promising technique to defend Code-Reuse Attacks (CRAs). Traditional CFI Systems and recent Context-Sensitive CFI use coarse control flow graphs (CFGs) to analyze whether the control flow hijack occurs, left vast space for attackers at indirect call-sites. Coarse CFGs make it difficult to decide which target to execute at indirect control-flow transfers, and weaken the existing CFI systems actually. It is an unsolved problem to extract CFGs precisely and perfectly from binaries now. In this paper, we present an algorithm to get a more precise CFG from binaries. Parameters are analyzed at indirect call-sites and functions firstly. By comparing counts of parameters prepared before call-sites and consumed by functions, targets of indirect calls are reduced. Then the control flow would be more constrained at indirect call-sites in runtime. Combined with CCFI, we implement our policy. Experimental results on some popular programs show that our approach is efficient. Further analysis show that it can mitigate COOP and other advanced attacks.

Keywords: contex-sensitive, CFI, binary analysis, code reuse attack

Procedia PDF Downloads 286
1009 The Influence of Grammatical Gender on Socially Constructed Gender in English, Dutch, and German

Authors: Noah Brandon

Abstract:

Grammatical gender can create a restrictive roadblock for the usage of gender-inclusive language. This research describes grammatical gender structures used in English, Dutch, and German and considers how these structures restrict the implementation of gender inclusivity in spoken and written discourse. This restriction is measured by the frequency with which gender-inclusive & generic masculine forms are used and by the morphosyntactic complexity of the gender-inclusive forms available in these languages. These languages form a continuum of grammatical gender structures, with English having the least articulated structures and German having the most. This leads to a comparative analysis intended to establish a correlation between the complexity of gender structure and the difficulty of using gender-inclusive forms. English, on one side of the continuum, maintains only remnants of a formal grammatical gender system and imposes the fewest restrictions on the creation of neo-pronouns and the use of gender-inclusive alternatives to gendered agentive nouns. Next, the Dutch have a functionally two-gender system with less freedom using gender-neutral forms. Lastly, German, on the other end, has a three-gender system requiring a plethora of morphosyntactic and orthographic alternatives to avoid using generic masculine. The paper argues that the complexity of grammatical gender structures correlates with hindered use of gender-inclusive forms. Going forward, efforts will focus on gathering further data on the usage of gender-inclusive and generic masculine forms within these languages. The end goal of this research is to establish a definitive objective correlation between grammatical gender complexity and impediments in expressing socially constructed gender.

Keywords: sociolinguistics, language and gender, gender, Germanic linguistics, grammatical gender, German, Dutch, English

Procedia PDF Downloads 46
1008 Money Laundering and Financing of Terrorism

Authors: Covadonga Mallada Fernández

Abstract:

Economic development and globalization of international markets have created a favourable atmosphere for the emergence of new forms of crime such as money laundering or financing of terrorism, which may contribute to destabilized and damage economic systems. In particular, money laundering have acquired great importance since the 11S attacks, what has caused on the one hand, the establishment and development of preventive measures and, on the other hand, a progressive hardening of penal measures. Since then, the regulations imposed to fight against money laundering have been viewed as key components also in the fight against terrorist financing. Terrorism, at the beginning, was a “national” crime connected with internal problems of the State (for instance the RAF in Germany or ETA in Spain) but in the last 20 years has started to be an international problem that is connected with the defence and security of the States. Therefore, the new strategic concept for the defense and security of NATO has a comprehensive list of security threats to the Alliance, such as terrorism, international instability, money laundering or attacks on cyberspace, among others. With this new concept, money laundering and terrorism has become a priority in the national defense. In this work we will analyze the methods to combat these new threats to the national security. We will study the preventive legislations to combat money laundering and financing of terrorism, the UIF that exchange information between States, and the hawala-Banking.

Keywords: control of financial flows, money laundering, terrorism, financing of terrorism

Procedia PDF Downloads 416
1007 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 200
1006 Investigation of External Pressure Coefficients on Large Antenna Parabolic Reflector Using Computational Fluid Dynamics

Authors: Varun K, Pramod B. Balareddy

Abstract:

Estimation of wind forces plays a significant role in the in the design of large antenna parabolic reflectors. Reflector surface accuracies are very sensitive to the gain of the antenna system at higher frequencies. Hence accurate estimation of wind forces becomes important, which is primary input for design and analysis of the reflector system. In the present work, numerical simulation of wind flow using Computational Fluid Dynamics (CFD) software is used to investigate the external pressure coefficients. An extensive comparative study has been made between the CFD results and the published wind tunnel data for different wind angle of attacks (α) acting over concave to convex surfaces respectively. Flow simulations using CFD are carried out to estimate the coefficients of Drag, Lift and Moment for the parabolic reflector. Coefficients of pressures (Cp) over the front and the rear face of the reflector are extracted over surface of the reflector to study the net pressure variations. These resultant pressure variations are compared with the published wind tunnel data for different angle of attacks. It was observed from the CFD simulations, both convex and concave face of reflector system experience a band of pressure variations for the positive and negative angle of attacks respectively. In the published wind tunnel data, Pressure variations over convex surfaces are assumed to be uniform and vice versa. Chordwise and spanwise pressure variations were calculated and compared with the published experimental data. In the present work, it was observed that the maximum pressure coefficients for α ranging from +30° to -90° and α=+90° was lower. For α ranging from +45° to +75°, maximum pressure coefficients were higher as compared to wind tunnel data. This variation is due to non-uniform pressure distribution observed over front and back faces of reflector. Variations in Cd, Cl and Cm over α=+90° to α=-90° was in close resemblance with the experimental data.

Keywords: angle of attack, drag coefficient, lift coefficient, pressure coefficient

Procedia PDF Downloads 225
1005 Numerical Study of Steel Structures Responses to External Explosions

Authors: Mohammad Abdallah

Abstract:

Due to the constant increase in terrorist attacks, the research and engineering communities have given significant attention to building performance under explosions. This paper presents a methodology for studying and simulating the dynamic responses of steel structures during external detonations, particularly for accurately investigating the impact of incrementing charge weight on the members total behavior, resistance and failure. Prediction damage method was introduced to evaluate the damage level of the steel members based on five scenarios of explosions. Johnson–Cook strength and failure model have been used as well as ABAQUS finite element code to simulate the explicit dynamic analysis, and antecedent field tests were used to verify the acceptance and accuracy of the proposed material strength and failure model. Based on the structural response, evaluation criteria such as deflection, vertical displacement, drift index, and damage level; the obtained results show the vulnerability of steel columns and un-braced steel frames which are designed and optimized to carry dead and live load to resist and endure blast loading.

Keywords: steel structure, blast load, terrorist attacks, charge weight, damage level

Procedia PDF Downloads 339
1004 Toward an Understanding of the Neurofunctional Dissociation between Animal and Tool Concepts: A Graph Theoretical Analysis

Authors: Skiker Kaoutar, Mounir Maouene

Abstract:

Neuroimaging studies have shown that animal and tool concepts rely on distinct networks of brain areas. Animal concepts depend predominantly on temporal areas while tool concepts rely on fronto-temporo-parietal areas. However, the origin of this neurofunctional distinction for processing animal and tool concepts remains still unclear. Here, we address this question from a network perspective suggesting that the neural distinction between animals and tools might reflect the differences in their structural semantic networks. We build semantic networks for animal and tool concepts derived from Mc Rae and colleagues’s behavioral study conducted on a large number of participants. These two networks are thus analyzed through a large number of graph theoretical measures for small-worldness: centrality, clustering coefficient, average shortest path length, as well as resistance to random and targeted attacks. The results indicate that both animal and tool networks have small-world properties. More importantly, the animal network is more vulnerable to targeted attacks compared to the tool network a result that correlates with brain lesions studies.

Keywords: animals, tools, network, semantics, small-world, resilience to damage

Procedia PDF Downloads 508
1003 Optimized and Secured Digital Watermarking Using Entropy, Chaotic Grid Map and Its Performance Analysis

Authors: R. Rama Kishore, Sunesh

Abstract:

This paper presents an optimized, robust, and secured watermarking technique. The methodology used in this work is the combination of entropy and chaotic grid map. The proposed methodology incorporates Discrete Cosine Transform (DCT) on the host image. To improve the imperceptibility of the method, the host image DCT blocks, where the watermark is to be embedded, are further optimized by considering the entropy of the blocks. Chaotic grid is used as a key to reorder the DCT blocks so that it will further increase security while selecting the watermark embedding locations and its sequence. Without a key, one cannot reveal the exact watermark from the watermarked image. The proposed method is implemented on four different images. It is concluded that the proposed method is giving better results in terms of imperceptibility measured through PSNR and found to be above 50. In order to prove the effectiveness of the method, the performance analysis is done after implementing different attacks on the watermarked images. It is found that the methodology is very strong against JPEG compression attack even with the quality parameter up to 15. The experimental results are confirming that the combination of entropy and chaotic grid map method is strong and secured to different image processing attacks.

Keywords: digital watermarking, discreate cosine transform, chaotic grid map, entropy

Procedia PDF Downloads 219
1002 Happiness and Its Political Consequences: A Proposal for a Socially Constructed Object

Authors: Luciano E. Sewaybricker

Abstract:

Psychology has faced many challenges in order to claim its right to study happiness. Probably the major issue has been to present a clear definition of happiness, which has a long history outside the scientific field and has been used imprecisely in the daily life. Even after years of great improvement, different meanings of happiness still have been seen in academic studies. This scenario allows to question if any definition is consistent enough to sustain the recent findings of the psychological processes behind happiness. Moreover, does it make sense to seek a single definition of happiness? By investigating the history of happiness and the theoretical foundations of Positive Psychology, it can be advocated that it’s proper for happiness to be polysemic. Since Ancient Greece most attempts to outline happiness consists of an appreciation of the "best way to live" and consequently requires a delineation of the most important things in life. Besides this generic definition, it’s hard to find consensus about happiness. In fact, what and how much something will be considered important to happiness depend on social influence. This compels happiness to vary between groups, historical periods, and even for the same person over time. Therefore, the same psychological processes will not necessarily be behind all forms of happiness. Consequently, three assumptions should be considered when studying happiness: it’s intrinsic of happiness to be transitory and socially influenced; happiness refers not only to what is possible in the present, but also to an ideal future; when someone (including a scientist) talks about happiness they describe and prescribe a better way to live. Because any attempt to define happiness will be limited in space and time, it's more suitable to study its variations than its universalities. This may have considerable consequences to political agenda on happiness evaluation and maximization, like Gross National Happiness and utilitarian initiatives. Happiness policies should be understood as an arbitrary choice amongst all kinds of happiness and as prescriptive of what “the best way to live” should be.

Keywords: happiness, politics, positive psychology, well-being

Procedia PDF Downloads 231
1001 Psychodiagnostic Tool Development for Measurement of Social Responsibility in Ukrainian Organizations

Authors: Olena Kovalchuk

Abstract:

How to define the understanding of social responsibility issues by Ukrainian companies is a contravention question. Thus, one of the practical uses of social responsibility is a diagnostic tool development for educational, business or scientific purposes. So the purpose of this research is to develop a tool for measurement of social responsibility in organization. Methodology: A 21-item questionnaire “Organization Social Responsibility Scale” was developed. This tool was adapted for the Ukrainian sample and based on the questionnaire “Perceived Role of Ethics and Social Responsibility” which connects ethical and socially responsible behavior to different aspects of the organizational effectiveness. After surveying the respondents, the factor analysis was made by the method of main compounds with orthogonal rotation VARIMAX. On the basis of the obtained results the 21-item questionnaire was developed (Cronbach’s alpha – 0,768; Inter-Item Correlations – 0,34). Participants: 121 managers at all levels of Ukrainian organizations (57 males; 65 females) took part in the research. Results: Factor analysis showed five ethical dilemmas concerning the social responsibility and profit compatibility in Ukrainian organizations. Below we made an attempt to interpret them: — Social responsibility vs profit. Corporate social responsibility can be a way to reduce operational costs. A firm’s first priority is employees’ morale. Being ethical and socially responsible is the priority of the organization. The most loaded question is "Corporate social responsibility can reduce operational costs". Significant effect of this factor is 0.768. — Profit vs social responsibility. Efficiency is much more important to a firm than ethics or social responsibility. Making the profit is the most important concern for a firm. The dominant question is "Efficiency is much more important to a firm than whether or not the firm is seen as ethical or socially responsible". Significant effect of this factor is 0.793. — A balanced combination of social responsibility and profit. Organization with social responsibility policy is more attractive for its stakeholders. The most loaded question is "Social responsibility and profitability can be compatible". Significant effect of this factor is 0.802. — Role of Social Responsibility in the successful organizational performance. Understanding the value of social responsibility and business ethics. Well-being and welfare of the society. The dominant question is "Good ethics is often good business". Significant effect of this factor is 0.727. — Global vision of social responsibility. Issues related to global social responsibility and sustainability. Innovative approaches to poverty reduction. Awareness of climate change problems. Global vision for successful business. The dominant question is "The overall effectiveness of a business can be determined to a great extent by the degree to which it is ethical and socially responsible". Significant effect of this factor is 0.842. The theoretical contribution. The perspective of the study is to develop a tool for measurement social responsibility in organizations and to test questionnaire’s adequacy for social and cultural context. Practical implications. The research results can be applied for designing a training programme for business school students to form their global vision for successful business as well as the ability to solve ethical dilemmas in managerial practice. Researchers interested in social responsibility issues are welcome to join the project.

Keywords: corporate social responsibility, Cronbach’s alpha, ethical behaviour, psychodiagnostic tool

Procedia PDF Downloads 334
1000 Enhancement of Transaction's Authentication for the Europay, MasterCard, and Visa Contactless Card Payments

Authors: Ossama Al-Maliki

Abstract:

Europay, MasterCard, and Visa (EMV) is one of the most popular payment protocol in the world. The EMV protocol supports Chip and PIN Transactions, Chip and Signature transactions, and Contactless transactions. This protocol suffers from tens of £ millions of lost per year due to many fraudulent payments. This is due to several reported vulnerable points in the protocols used for such payments that allow skimming, replay, cloning, Mole Point of Sale (POS), relay, and other attacks to be conducted. In this paper, we are focusing on the EMV contactless specification and we have proposed two proposal solutions to the addition of a localization factor to enhance the payment authentication of such transactions designed to prevent relay, cloning, and Mole-POS attacks. Our proposed solution is a back-end localization scheme to help the Issuer-Bank compare the location of the genuine cardholder in relation to the used POS. Our scheme uses 'something you have' which is the Cardholder Smartphone (CSP) to provide the location of the cardholder at the time of the transaction and without impacting the contactless payment time/protocol. The Issuer-bank obtain the CSP Location using tried and tested localization techniques, and independently of the cardholder. Both of our proposal solutions do not require infrastructure changes, and it uses existing EMV/SP protocol messages to communicate our scheme information.

Keywords: NFC, RFID, contactless card, authentication, location, EMV

Procedia PDF Downloads 217
999 A Qualitative Exploration into Australian Muslims Emerging into Adulthood

Authors: Nuray Okcum, Jenny Sharples

Abstract:

While the scrutinization towards marginalized groups throughout the globe has been existent for decades, prejudice towards Muslims in Western countries has been increasing dramatically. The vicious attacks across the globe by perpetrators who identify with Islam as well as popular political discourse by politicians in Western countries claiming and portraying Muslims as being dangerous, oppressed, or lacking the ability to assimilate into the community, adds to the exclusion and lack of belonging Muslims living in Western countries experience. The early stages of adulthood which have recently been conceptualized as emerging adulthood is a critical and socially ambiguous transition. For a young Muslim emerging into adulthood in a Western country, a variety of different challenges and demands that can exceed their coping abilities can arise. While in search for their identity and in a bid to structure themselves with their past childhood experiences together with their newly forming values, the emerging adult may attempt to direct or change the way in which they are viewed by others. This can be done to gain approval from others and to feel a sense of belonging. A change in the emerging adult’s interpersonal interactions and relationships, the way in which they view themselves and others, their sense of belonging, and their identity, also occurs during this developmental stage. To explore the manner in which Muslims emerging into adulthood carve their identity, their experiences, and representation of their Muslim identity, social identification, and their sense of belonging in Australia, an interpretative phenomenological methodology was utilized. This allowed participants to offer their own subjective experiences. A total of eight emerging adults took part in the study whilst four adults who work with emerging adults took part. Adult participants who work with emerging adults took part in the study to bring forth their insight and experiences. Common experiences were organized into themes. Themes included identifying as a Muslim, social identification, and belonging. Identification included visual identification and name, discrimination and resilience. Findings clearly indicated that Muslims emerging into adulthood in Australia do face various hurdles while they try to retain and represent their religious identity. Despite the unique challenges that they face, they still feel a sense of belonging and identity as being Australian.

Keywords: Muslim, Islam, emerging adulthood, Australia

Procedia PDF Downloads 109
998 Multi-Tooled Robotic Hand for Tele-Operation of Explosive Devices

Authors: Faik Derya Ince, Ugur Topgul, Alp Gunay, Can Bayoglu, Dante J. Dorantes-Gonzalez

Abstract:

Explosive attacks are arguably the most lethal threat that may occur in terrorist attacks. In order to counteract this issue, explosive ordnance disposal operators put their lives on the line to dispose of a possible improvised explosive device. Robots can make the disposal process more accurately and saving human lives. For this purpose, there is a demand for more accurate and dexterous manipulating robotic hands that can be teleoperated from a distance. The aim of this project is to design a robotic hand that contains two active and two passive DOF for each finger, as well as a minimum set of tools for mechanical cutting and screw driving within the same robotic hand. Both hand and toolset, are teleoperated from a distance from a haptic robotic glove in order to manipulate dangerous objects such as improvised explosive devices. SolidWorks® Computer-Aided Design, computerized dynamic simulation, and MATLAB® kinematic and static analysis were used for the robotic hand and toolset design. Novel, dexterous and robust solutions for the fingers were obtained, and six servo motors are used in total to remotely control the multi-tooled robotic hand. This project is still undergoing and presents currents results. Future research steps are also presented.

Keywords: Explosive Manipulation, Robotic Hand, Tele-Operation, Tool Integration

Procedia PDF Downloads 111
997 Under the 'Umbrella' Project: A Volunteer-Mentoring Approach for Socially Disadvantaged University Students

Authors: Evridiki Zachopoulou, Vasilis Grammatikopoulos, Michail Vitoulis, Athanasios Gregoriadis

Abstract:

In the last ten years, the recent economic crisis in Greece has decreased the financial ability and strength of several families when it comes to supporting their children’s studies. As a result, the number of students who are significantly delaying or even dropping out of their university studies is constantly increasing. The students who are at greater risk for academic failure are those who are facing various problems and social disadvantages, like health problems, special needs, family poverty or unemployment, single-parent students, immigrant students, etc. The ‘Umbrella’ project is a volunteer-based initiative to tackle this problem at International Hellenic University. The main purpose of the project is to provide support to disadvantaged students at a socio-emotional, academic, and practical level in order to help them complete their undergraduate studies. More specifically, the ‘Umbrella’ project has the following goals: (a) to develop a consulting-supporting network based on volunteering senior students, called ‘i-mentors’. (b) to train the volunteering i-mentors and create a systematic and consistent support procedure for students at-risk, (c), to develop a service that, parallel to the i-mentor network will be ensuring opportunities for at-risk students to find a job, (d) to support students who are coping with accessibility difficulties, (e) to secure the sustainability of the ‘Umbrella’ project after the completion of the funding of the project. The innovation of the Umbrella project is in its holistic-person-centered approach that will be providing individualized support -via the i-mentors network- to any disadvantaged student that will come ‘under the Umbrella.’

Keywords: peer mentoring, student support, socially disadvantaged students, volunteerism in higher education

Procedia PDF Downloads 209
996 Detecting and Thwarting Interest Flooding Attack in Information Centric Network

Authors: Vimala Rani P, Narasimha Malikarjunan, Mercy Shalinie S

Abstract:

Data Networking was brought forth as an instantiation of information-centric networking. The attackers can send a colossal number of spoofs to take hold of the Pending Interest Table (PIT) named an Interest Flooding attack (IFA) since the in- interests are recorded in the PITs of the intermediate routers until they receive corresponding Data Packets are go beyond the time limit. These attacks can be detrimental to network performance. PIT expiration rate or the Interest satisfaction rate, which cannot differentiate the IFA from attacks, is the criterion Traditional IFA detection techniques are concerned with. Threshold values can casually affect Threshold-based traditional methods. This article proposes an accurate IFA detection mechanism based on a Multiple Feature-based Extreme Learning Machine (MF-ELM). Accuracy of the attack detection can be increased by presenting the entropy of Internet names, Interest satisfaction rate and PIT usage as features extracted in the MF-ELM classifier. Furthermore, we deploy a queue-based hostile Interest prefix mitigation mechanism. The inference of this real-time test bed is that the mechanism can help the network to resist IFA with higher accuracy and efficiency.

Keywords: information-centric network, pending interest table, interest flooding attack, MF-ELM classifier, queue-based mitigation strategy

Procedia PDF Downloads 177
995 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6

Authors: M. Moslehpour, S. Khorsandi

Abstract:

Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.

Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing

Procedia PDF Downloads 256
994 Isolation and Culture of Keratinocytes and Fibroblasts to Develop Artificial Skin Equivalent in Cats

Authors: Lavrentiadou S. N., Angelou V., Chatzimisios K., Papazoglou L.

Abstract:

The aim of this study was the isolation and culture of keratinocytes and fibroblasts from feline skin to ultimately create an artificial engineered skin (including dermis and epidermis) useful for the effective treatment of large cutaneous deficits in cats. Epidermal keratinocytes and dermal fibroblasts were freshly isolated from skin biopsies using an 8 mm biopsy punch obtained from 8 healthy cats that had undergone ovariohysterectomy. The owner’s consent was obtained. All cats had a complete blood count and a serum biochemical analysis and were screened for feline leukemia virus (FeLV) and feline immunodeficiency virus (FIV) preoperatively. The samples were cut into small pieces and incubated with collagenase (2 mg/ml) for 5-6 hours. Following digestion, cutaneous cells were filtered through a 100 μm cell strainer, washed with DMEM, and grown in DMEM supplemented with 10% FBS. The undigested epidermis was washed with DMEM and incubated with 0.05% Trypsin/0.02% EDTA (TE) solution. Keratinocytes recovered in the TE solution were filtered through a 100 μm and a 40 μm cell strainer and, following washing, were grown on a collagen type I matrix in DMEM: F12 (3:1) medium supplemented with 10% FΒS, 1 μm hydrocortisone, 1 μm isoproterenol and 0.1 μm insulin. Both fibroblasts and keratinocytes were grown in a humidified atmosphere with 5% CO2 at 37oC. The medium was changed twice a week and cells were cultured up to passage 4. Cells were grown to 70-85% confluency, at which point they were trypsinized and subcultured in a 1:4 dilution. The majority of the cells in each passage were transferred to a freezing medium and stored at -80oC. Fibroblasts were frozen in DMEM supplemented with 30% FBS and 10% DMSO, whereas keratinocytes were frozen in a complete keratinocyte growth medium supplemented with 10% DMSO. Both cell types were thawed and successfully grown as described above. Therefore, we can create a bank of fibroblasts and keratinocytes, from which we can recover cells for further culture and use for the generation of skin equivalent in vitro. In conclusion, cutaneous cell isolation and cell culture and expansion were successfully developed. To the authors’ best knowledge, this is the first study reporting isolation and culture of keratinocytes and fibroblasts from feline skin. However, these are preliminary results and thus, the development of autologous-engineered feline skin is still in process.

Keywords: cat, fibroblasts, keratinocytes, skin equivalent, wound

Procedia PDF Downloads 79
993 Effects of Blast Load on Historic Stone Masonry Buildings in Canada: A Review and Analytical Study

Authors: Abass Braimah, Maha Hussein Abdallah

Abstract:

The global ascendancy of terrorist attacks on building infrastructure with economic and heritage significance has increased awareness of the possibility of terrorism in Canada. Many structures in Canada that are at risk of terrorist attacks include government buildings, built many years ago of historic stone masonry construction. Although many researchers are investigating ways to retrofit masonry stone buildings to mitigate the effect of blast loadings, lack of knowledge on the dynamic behavior of historic stone masonry structures under blast loads makes it difficult to ascertain the effectiveness of the retrofitting techniques. This paper presents a review of open-source literature for the experimental and numerical stone masonry structures under blast loads. This review yielded very little information of the response of the historic stone masonry structures under blast loads. Thus, a comprehensive study is needed to understand the blast load effects on historic stone masonry buildings. The out-of-plane response of historic masonry structures to blast loads is investigated by using single-degree-of-freedom analysis. This approach presents equations that can be used effectively in the analysis of historic masonry walls to out-of-plane blast loading.

Keywords: blast loads, historical buildings, masonry structure, single-degree-of-freedom analysis

Procedia PDF Downloads 144
992 A Functional Analysis of the 2016 United States Presidential Debates through the Application of the Functional Theory of Political Campaign Discourse

Authors: Maryam Vaezi

Abstract:

In this study, the Functional Theory of Political Campaign Discourse has been applied in order to investigate the 2016 Clinton-Trump presidential debates. All three kinds of utterances (acclaims, attacks, and defenses) were produced by the candidates supporting the usefulness of the Functional Theory of Political Campaign Discourse for the analysis of the presidential debates as a type of political discourse. Attacks comprised 45% of the candidates’ utterances, followed by acclaims at 33%; defenses were the least common function at 22%. The candidate from the Democratic Party, Hillary Clinton, acclaimed more, whereas the Republican Party presidential candidate, Donald Trump, attacked more. Simple denial was the most common form of defense used by the candidates. Both candidates directed more of their utterances to policy (past deeds, future plans, and general goals) than character (personal qualities, leadership abilities, and ideals). Analyzing debates in terms of the functions performed by the candidates to increase their desirability and chance of winning the election, can lead to a better understanding of these significant political events as well as other forms of political discourse.

Keywords: acclaim, attack, defend, character, Democratic Party, Donald Trump, Hillary Clinton, policy, presidential debates, Republican Party

Procedia PDF Downloads 298
991 Detecting Venomous Files in IDS Using an Approach Based on Data Mining Algorithm

Authors: Sukhleen Kaur

Abstract:

In security groundwork, Intrusion Detection System (IDS) has become an important component. The IDS has received increasing attention in recent years. IDS is one of the effective way to detect different kinds of attacks and malicious codes in a network and help us to secure the network. Data mining techniques can be implemented to IDS, which analyses the large amount of data and gives better results. Data mining can contribute to improving intrusion detection by adding a level of focus to anomaly detection. So far the study has been carried out on finding the attacks but this paper detects the malicious files. Some intruders do not attack directly, but they hide some harmful code inside the files or may corrupt those file and attack the system. These files are detected according to some defined parameters which will form two lists of files as normal files and harmful files. After that data mining will be performed. In this paper a hybrid classifier has been used via Naive Bayes and Ripper classification methods. The results show how the uploaded file in the database will be tested against the parameters and then it is characterised as either normal or harmful file and after that the mining is performed. Moreover, when a user tries to mine on harmful file it will generate an exception that mining cannot be made on corrupted or harmful files.

Keywords: data mining, association, classification, clustering, decision tree, intrusion detection system, misuse detection, anomaly detection, naive Bayes, ripper

Procedia PDF Downloads 390
990 Planning Politics of Dhaka City: Recent Urbanization and Gentrification

Authors: N. M. Esa Abrar Khan

Abstract:

This paper will describe how a city planning can be abusive and promote gentrification in Dhaka city area in an extreme remorseless way. To our knowledge, Dhaka is enormously overpopulated, and its somewhat unrest political situation and corruption is promoting not only bruised urban growth but also this growth leering people socially and mentally. Due to globalization, whole world is in a rat race of development fiesta and Bangladesh is no longer falling back in this race. Recent political agenda is to develop the country anyhow, whether it is a good development or not. In the name of development, Dhaka city is becoming overwhelmed with flyovers, needless shopping malls and commercial complexes. This drastic urbanization is promoting gentrification. Gentrification is the process of societal change which intimidate the existing group of people from a certain place and encouraging affluent group of people on that place and eventually they take the control of that place. Process of gentrification is more capitalistic rather socially democratic. Architects are indirectly or directly related with this social change and politics is the catalyst of these social alteration. The methodology of this paper was mainly dependent on mass interviews including political leaders and activist’s interviews. Also, photographic analysis, empirical research etc. helped to create this paper. Secondary data were collected from different published and unpublished documents, relevant research articles, and books. From the study, it is clearly can be said that architects and urban designers are promoting social imbalance. The paper tried to suggest how architects and other designers can help to resist gentrification and can remain the social heterogeneity.

Keywords: gentrification, migration, Bangladesh, urban, globalization, hybrid

Procedia PDF Downloads 138
989 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification

Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang

Abstract:

One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.

Keywords: malware detection, network security, targeted attack, computational intelligence

Procedia PDF Downloads 228