Search results for: threat analysis
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 27422

Search results for: threat analysis

27212 The Effect of Media Effect, Conformity, and Personality on Customers’ Purchase Intention under the Influence of COVID-19 Pandemic

Authors: Tsai-Yun Liao, Fang-Yi Hsu

Abstract:

Consumer behavior and consumption patterns have changed in reacting to the threat of COVID-19 pandemic situations. In order to explore the factors affecting customers’ purchase intention under the influence of the COVID-19 pandemic, this research uses structural equation modeling to explore the effect of media effect, conformity, and personality on customers’ purchase intention. Four essential objectives are investigated: how does media affect the conformity and perceived value of customers; the effect of media effect, conformity, and personality on customers’ purchase intention; the moderating effect of personality; and the mediating effect of perceived value toward purchase intention. By convenience sampling method, 428 questionnaires were collected, and the total number of valid samples was 406. Data analysis and results indicate that: (1) The media effect positively affects conformity. (2) The media effect positively affects perceived value. (3) Both conformity and perceived value positively affect purchase intention. (4) Consumer’s personality of openness to experience moderates the relationship between conformity and purchase intention. (5) Media effect affects purchase intention through the mediating effect of perceived value. This study contributes to the research by providing the factors affecting customers’ purchase intention and to the enterprises by maintaining incumbent customers and attracting potential customers.

Keywords: COVID-19, media effect, conformity, personality, purchase intention

Procedia PDF Downloads 111
27211 Political Islam: From Coinage to Hot Debate

Authors: Sajid Iqbal Sheikh

Abstract:

From almost last 100 years 'political islam' has diversity in its usage as terminology in the speculative works of both muslim and non-muslims theorists. 'Political islam' as a term was coined consciously as equal to the 'militant islam' and “Terrorist Islam” vs “Plain Islam” and “Modern Islam” etc. Many paradigm shifts tamed the term into one of the hottest debate of the day. This research paper aims to categorize historical linkage of its coinage, development phases and present status. Based on content analysis, Narrative approach has been utilized for the sake of dexterous conclusion. The paper treasures out that Western dominance on civilizational and political spheres of the holistic world considers 'political islam' a gigantic threat and plans to resist it in theoretic and practical fields simultaneously. Despite minor strategic variances, the ideological followers of Syed Qutab, Mulana Mudoodi and Hasan Al-Bana, are struggling hard for the achievement of their ultimate goal of Political change, specifically in the Muslim World in the prior phase. The paper concludes that Resistance to Islamic resurgence and its Political goals is being observed in most of the Muslim world, especially in the Turkey, Algeria, Egypt, Tsunia and Yeman etc, which is a basic cause of contrary reaction in the Muslim World.

Keywords: electoral process, islamic resurgence, islamic political theory, muslim response, resistance, western hegemony

Procedia PDF Downloads 421
27210 Culturally Relevant Education Challenges and Threats in the US Secondary Classroom

Authors: Owen Cegielski, Kristi Maida, Danny Morales, Sylvia L. Mendez

Abstract:

This study explores the challenges and threats US secondary educators experience in incorporating culturally relevant education (CRE) practices in their classrooms. CRE is a social justice pedagogical practice used to connect student’s cultural references to academic skills and content, to promote critical reflection, to facilitate cultural competence, and to critique discourses of power and oppression. Empirical evidence on CRE demonstrates positive student educational outcomes in terms of achievement, engagement, and motivation. Additionally, due to the direct focus on uplifting diverse cultures through the curriculum, students experience greater feelings of belonging, increased interest in the subject matter, and stronger racial/ethnic identities. When these teaching practices are in place, educators develop deeper relationships with their students and appreciate the multitude of gifts they (and their families) bring to the classroom environment. Yet, educators regularly report being unprepared to incorporate CRE in their daily teaching practice and identify substantive gaps in their knowledge and skills in this area. Often, they were not exposed to CRE in their educator preparation program, nor do they receive adequate support through school- or district-wide professional development programming. Through a descriptive phenomenological research design, 20 interviews were conducted with a diverse set of secondary school educators to explore the challenges and threats they experience in incorporating CRE practices in their classrooms. The guiding research question for this study is: What are the challenges and threats US secondary educators face when seeking to incorporate CRE practices in their classrooms? Interviews were grounded by the theory of challenge and threat states, which highlights the ways in which challenges and threats are appraised and how resources factor into emotional valence and perception, as well as the potential to meet the task at hand. Descriptive phenomenological data analysis strategies were utilized to develop an essential structure of the educators’ views of challenges and threats in regard to incorporating CRE practices in their secondary classrooms. The attitude of the phenomenological reduction method was adopted, and the data were analyzed through five steps: sense of the whole, meaning units, transformation, structure, and essential structure. The essential structure that emerged was while secondary educators display genuine interest in learning how to successfully incorporate CRE practices, they perceive it to be a challenge (and not a threat) due to lack of exposure which diminishes educator capacity, comfort, and confidence in employing CRE practices. These findings reveal the value of attending to emotional valence and perception of CRE in promoting this social justice pedagogical practice. Findings also reveal the importance of appropriately resourcing educators with CRE support to ensure they develop and utilize this practice.

Keywords: culturally relevant education, descriptive phenomenology, social justice practice, US secondary education

Procedia PDF Downloads 150
27209 Contingent Presences in Architecture: Vitruvian Theory as a Beginning

Authors: Zelal Çınar

Abstract:

This paper claims that architecture is a contingent discipline, despite the fact that its contingency has long been denied through a retreat to Vitruvian writing. It is evident that contingency is rejected not only by architecture but also by modernity as a whole. Vitruvius attempted to cover the entire field of architecture in a systematic form in order to bring the whole body of this great discipline to a complete order. The legacy of his theory hitherto lasted not only that it is the only major work on the architecture of Classical Antiquity to have survived, but also that its conformity with the project of modernity. In the scope of the paper, it will be argued that contingency should be taken into account rather than avoided as a potential threat.

Keywords: architecture, contingency, modernity, Vitruvius

Procedia PDF Downloads 257
27208 Fake News Domination and Threats on Democratic Systems

Authors: Laura Irimies, Cosmin Irimies

Abstract:

The public space all over the world is currently confronted with the aggressive assault of fake news that have lately impacted public agenda setting, collective decisions and social attitudes. Top leaders constantly call out most mainstream news as “fake news” and the public opinion get more confused. "Fake news" are generally defined as false, often sensational, information disseminated under the guise of news reporting and has been declared the word of the year 2017 by Collins Dictionary and it also has been one of the most debated socio-political topics of recent years. Websites which, deliberately or not, publish misleading information are often shared on social media where they essentially increase their reach and influence. According to international reports, the exposure to fake news is an undeniable reality all over the world as the exposure to completely invented information goes up to the 31 percent in the US, and it is even bigger in Eastern Europe countries, such as Hungary (42%) and Romania (38%) or in Mediterranean countries, such as Greece (44%) or Turkey (49%), and lower in Northern and Western Europe countries – Germany (9%), Denmark (9%) or Holland (10%). While the study of fake news (mechanism and effects) is still in its infancy, it has become truly relevant as the phenomenon seems to have a growing impact on democratic systems. Studies conducted by the European Commission show that 83% of respondents out of a total of 26,576 interviewees consider the existence of news that misrepresent reality as a threat for democracy. Studies recently conducted at Arizona State University show that people with higher education can more easily spot fake headlines, but over 30 percent of them can still be trapped by fake information. If we were to refer only to some of the most recent situations in Romania, fake news issues and hidden agenda suspicions related to the massive and extremely violent public demonstrations held on August 10th, 2018 with a strong participation of the Romanian diaspora have been massively reflected by the international media and generated serious debates within the European Commission. Considering the above framework, the study raises four main research questions: 1. Is fake news a problem or just a natural consequence of mainstream media decline and the abundance of sources of information? 2. What are the implications for democracy? 3. Can fake news be controlled without restricting fundamental human rights? 4. How could the public be properly educated to detect fake news? The research uses mostly qualitative but also quantitative methods, content analysis of studies, websites and media content, official reports and interviews. The study will prove the real threat fake news represent and also the need for proper media literacy education and will draw basic guidelines for developing a new and essential skill: that of detecting fake in news in a society overwhelmed by sources of information that constantly roll massive amounts of information increasing the risk of misinformation and leading to inadequate public decisions that could affect democratic stability.

Keywords: agenda setting democracy, fake news, journalism, media literacy

Procedia PDF Downloads 97
27207 Victim and Active Subject of the Crime of Violence in Family Reflected in the Criminal Code of the Republic of Moldova

Authors: Nastas Andrei

Abstract:

Ensuring accessible and functional justice is one of the priority objectives of judicial reform, and protecting the family against any acts that may harm its existence is one of the first priorities that have determined the need to defend the social order. In this context, the correlative approach of the victim and the aggressor becomes relevant as a subject of the crime of domestic violence. Domestic violence is a threat of physical, moral, or material harm, externalized now or in the past, or its provocation, which is characterized by a constant tendency to escalate and a high probability of repetitiveness in the relationship between the social partners, regardless of their legal status or domicile.Studying the legal support to identify the particularities of the victim and the subject of the crime of domestic violence facilitates the identification of the determinants of this crime, therefore, the development of means to prevent domestic violence. The scientific research has been effectuated on the base of the proper and authentic empirical data obtained from the analysis of the judicial practice in the matter of domestic violence, as well as being based on the most recent scientific issues in the field of the Substantive Criminal Law and other branches of science (criminology, psychology, sociology, pedagogy). As a result of the study performed, there have been formulated conclusions and interpretations able to be used in the science of the Substantive Criminal law, as well as in the practice of application of the legal norm in the matter of domestic violence.

Keywords: family violence, victim, crime, violence

Procedia PDF Downloads 75
27206 The Effectiveness of Cathodic Protection on Microbiologically Influenced Corrosion Control

Authors: S. Taghavi Kalajahi, A. Koerdt, T. Lund Skovhus

Abstract:

Cathodic protection (CP) is an electrochemical method to control and manage corrosion in different industries and environments. CP which is widely used, especially in buried and sub-merged environments, which both environments are susceptible to microbiologically influenced corrosion (MIC). Most of the standards recommend performing CP using -800 mV, however, if MIC threats are high or sulfate reducing bacteria (SRB) is present, the recommendation is to use more negative potentials for adequate protection of the metal. Due to the lack of knowledge and research on the effectiveness of CP on MIC, to the author’s best knowledge, there is no information about what MIC threat is and how much more negative potentials should be used enabling adequate protection and not overprotection (due to hydrogen embrittlement risk). Recently, the development and cheaper price of molecular microbial methods (MMMs) open the door for more effective investigations on the corrosion in the presence of microorganisms, along with other electrochemical methods and surface analysis. In this work, using MMMs, the gene expression of SRB biofilm under different potentials of CP will be investigated. The specific genes, such as pH buffering, metal oxidizing, etc., will be compared at different potentials, enabling to determine the precise potential that protect the metal effectively from SRB. This work is the initial step to be able to standardize the recommended potential under MIC condition, resulting better protection for the infrastructures.

Keywords: cathodic protection, microbiologically influenced corrosion, molecular microbial methods, sulfate reducing bacteria

Procedia PDF Downloads 67
27205 Potential Assessment and Techno-Economic Evaluation of Photovoltaic Energy Conversion System: A Case of Ethiopia Light Rail Transit System

Authors: Asegid Belay Kebede, Getachew Biru Worku

Abstract:

The Earth and its inhabitants have faced an existential threat as a result of severe manmade actions. Global warming and climate change have been the most apparent manifestations of this threat throughout the world, with increasingly intense heat waves, temperature rises, flooding, sea-level rise, ice sheet melting, and so on. One of the major contributors to this disaster is the ever-increasing production and consumption of energy, which is still primarily fossil-based and emits billions of tons of hazardous GHG. The transportation industry is recognized as the biggest actor in terms of emissions, accounting for 24% of direct CO2 emissions and being one of the few worldwide sectors where CO2 emissions are still growing. Rail transportation, which includes all from light rail transit to high-speed rail services, is regarded as one of the most efficient modes of transportation, accounting for 9% of total passenger travel and 7% of total freight transit. Nonetheless, there is still room for improvement in the transportation sector, which might be done by incorporating alternative and/or renewable energy sources. As a result of these rapidly changing global energy situations and rapidly dwindling fossil fuel supplies, we were driven to analyze the possibility of renewable energy sources for traction applications. Even a small achievement in energy conservation or harnessing might significantly influence the total railway system and have the potential to transform the railway sector like never before. As a result, the paper begins by assessing the potential for photovoltaic (PV) power generation on train rooftops and existing infrastructure such as railway depots, passenger stations, traction substation rooftops, and accessible land along rail lines. As a result, a method based on a Google Earth system (using Helioscopes software) is developed to assess the PV potential along rail lines and on train station roofs. As an example, the Addis Ababa light rail transit system (AA-LRTS) is utilized. The case study examines the electricity-generating potential and economic performance of photovoltaics installed on AALRTS. As a consequence, the overall capacity of solar systems on all stations, including train rooftops, reaches 72.6 MWh per day, with an annual power output of 10.6 GWh. Throughout a 25-year lifespan, the overall CO2 emission reduction and total profit from PV-AA-LRTS can reach 180,000 tons and 892 million Ethiopian birrs, respectively. The PV-AA-LRTS has a 200% return on investment. All PV stations have a payback time of less than 13 years, and the price of solar-generated power is less than $0.08/kWh, which can compete with the benchmark price of coal-fired electricity. Our findings indicate that PV-AA-LRTS has tremendous potential, with both energy and economic advantages.

Keywords: sustainable development, global warming, energy crisis, photovoltaic energy conversion, techno-economic analysis, transportation system, light rail transit

Procedia PDF Downloads 55
27204 Climate Change Adaptation Interventions in Agriculture and Sustainable Development through South-South Cooperation in Sub-Saharan Africa

Authors: Nuhu Mohammed Gali, Kenichi Matsui

Abstract:

Climate change poses a significant threat to agriculture and food security in Africa. The UNFCC recognized the need to address climate change adaptation in the broader context of sustainable development. African countries have initiated a governance system for adapting and responding to climate change in their Nationally Determined Contributions (NDCs). Despite the implementation limitations, Africa’s adaptation initiatives highlight the need to strengthen and expand adaptation responses. This paper looks at the extent to which South-South cooperation facilitates the implementation of adaptation actions between nations for agriculture and sustainable development. We conducted a literature review and content analysis of reports prepared by international organizations, reflecting the diversity of adaptation activities taking place in Sub-Saharan Africa. Our analysis of the connection between adaptation and nationally determined contributions (NDCs) showed that climate actions are mainstreamed into sustainable development. The NDCs in many countries on climate change adaptation action for agriculture aimed to strengthen the resilience of the poor. We found that climate-smart agriculture is the core of many countries target to end hunger. We revealed that South-South Cooperation, in terms of capacity, technology, and financial support, can help countries to achieve their climate action priorities and the Sustainable Development Goals (SDGs). We found that inadequate policy and regulatory frameworks between countries, differences in development priorities and strategies, poor communication, inadequate coordination, and the lack of local engagement and advocacy are some key barriers to South-South Cooperation in Africa. We recommend a multi-dimensional partnership, provisionoffinancialresources, systemic approach for coordination and engagement to promote and achieve the potential of SSC in Africa.

Keywords: climate change, adaptation, food security, sustainable development goals

Procedia PDF Downloads 89
27203 Functionalized Mesoporous Silica: Absorbents for Water Purification

Authors: Saima Nasreen, Uzaira Rafique, Shery Ehrman, Muhammad Aqeel Ashraf

Abstract:

The release of heavy metals into the environment is a potential threat to water and soil quality as well as to plant, animal and human health. In current research work, organically functionalized mesoporous silicates (MSU-H) were prepared by the co-condensation between sodium silicate and oregano alkoxysilanes in the presence of the nonionic surfactant triblock copolymer P104. The surfactant was used as a template for improving the porosity of the hybrid gels. Synthesized materials were characterized by TEM, FT-IR, SEM/EDX, TG, surface area analysis. The surface morphology and textural properties of such materials varied with various kinds of groups in the channels. In this study, removal of some heavy metals ions from aqueous solution by adsorption process was investigated. Batch adsorption studies show that the adsorption capacity of metal ions on the functionalized silicates is more than that on pure MSU-H. Data shows adsorption on synthesized materials is a time efficient process, suggesting adsorption on external surface as well as the mesoporous process. Adsorption models of Langmuir, Freundlich, and Temkin depicted equal goodness for all adsorbents, whereas pseudo 2nd order kinetics is in best agreement with experimental data.

Keywords: heavy metals, mesoporous silica, hybrid, adsorption, freundlich, langmuir, temkin

Procedia PDF Downloads 244
27202 Characterization of Filled HNBR Elastomers for Sealing Application in Cold Climate Areas

Authors: Anton G. Akulichev, Avinash Tiwari, Ben Alcock, Andreas Echtermeyer

Abstract:

Low temperatures are known to pose a major threat for polymers; many are prone to excessive stiffness or even brittleness. There is a technology gap between the properties of existing elastomeric sealing materials and the properties needed for service in extremely cold regions. Moreover, some aspects of low temperature behaviour of rubber are not thoroughly studied and understood. The paper presents results of laboratory testing of a conventional oilfield HNBR (hydrogenated nitrile butadiene rubber) elastomer at low climatic temperatures above and below its glass transition point, as well as the performance of some filled HNBR formulations. Particular emphasis in the experiments is put on rubber viscoelastic characteristics studied by Dynamic Mechanical Analysis (DMA) and quasi-static mechanical testing results at low temperatures. As demonstrated by the stress relaxation and DMA experiments the transition region near Tg of the studied compound has the most striking features, like rapid stress relaxation, as compared to the glassy and rubbery plateau. In addition the quasi-static experiments show that molecular movement below Tg is not completely frozen, but rather evident and manifested in a certain stress decay as well. The effect of temperature and filler additions on typical mechanical and other properties of the materials is also discussed.

Keywords: characterization, filled elastomers, HNBR, low temperature

Procedia PDF Downloads 281
27201 The Role of Trust in International Relations– Examining India’s Gujaral Doctrine and South Asian Politics

Authors: Bhavana Mahajan

Abstract:

International Relations is a discipline of paradoxes. The State is the dominant political institution, yet little attention has been accorded to why individual countries behave the way they do with the theoretical analysis dismissing the State as a reactionary monolith – thus States either play to “quest for power” or to “systemic” forces. However, States do behave as and are influenced by agents when interacting with international structures as well as with other states. While questions on “competitive power politics” and “trust” have been examined and developed to a fair extent by International Relations theorists in the post 1990s period, their application to the domain of South Asian politics is limited and little research, if any, examines the conduct of foreign policy beyond rational choice. This paper is an initial attempt to marry these theoretical insights with the foreign policy exercised by India especially the case of the “Gujral Doctrine, as one of “non-reciprocal accommodation”. Ignoring the view that such a policy move can be viewed as political “feinting” or deception, it is noteworthy that India even made the first move in terms of defining its role as one who “trusts” rather than one who “seeks” to trust, given the country’s geo-strategic context and threat perceptions.

Keywords: India’s foreign policy, South Asia, social constructivism, English school, trusting relationships, Gujral Doctrine, rationality

Procedia PDF Downloads 316
27200 Use of an Insecticidal-Iridovirus Kinase towards the Development of Aphid-Resistant Plants

Authors: Saranya Ganapathy, Megha N. Parajulee, Michael San Francisco, Hong Zhang

Abstract:

Insect pests are a serious threat to agricultural productivity. Use of chemical pesticides, the predominant control method thus far, has resulted in environmental damage, pest resurgence, and negative effects on non-target species. Genetically modified (GM) crops offer a promising alternative, and Bacillus thuringiensis endotoxin genes have played a major role in this respect. However, to overcome insect tolerance issues and to broaden the target range, it is critical to identify alternative-insecticidal toxins working through novel mechanisms. Our research group has identified a kinase from Chilo iridescent virus (CIV; Family Iridoviridae) that has insecticidal activity and designated it as ISTK (Iridovirus Serine/Threonine Kinase). A 35 kDa truncated form of ISTK, designated iridoptin, was obtained during expression and purification of ISTK in the yeast system. This yeast-expressed CIV toxin induced 50% mortality in cotton aphids and 100% mortality in green peach aphids (GPA). Optimized viral genes (o-ISTK and o-IRI) were stably transformed into the model plant, Arabidopsis. PCR analysis of genomic DNA confirmed the presence of the gene insert (oISTK/oIRI) in selected transgenic lines. The further screening was performed to identify the PCR positive lines that showed expression of respective toxins at the polypeptide level using Western blot analysis. The stable lines expressing either of these two toxins induced moderate to very high mortality in GPAs and significantly affected GPA development and fecundity. The aphicidal potential of these transgenic Arabidopsis lines will be presented.

Keywords: Chilo iridescent virus, insecticidal toxin, iridoviruses, plant-incorporated protectants, serine/threonine kinase

Procedia PDF Downloads 255
27199 Multi-Tooled Robotic Hand for Tele-Operation of Explosive Devices

Authors: Faik Derya Ince, Ugur Topgul, Alp Gunay, Can Bayoglu, Dante J. Dorantes-Gonzalez

Abstract:

Explosive attacks are arguably the most lethal threat that may occur in terrorist attacks. In order to counteract this issue, explosive ordnance disposal operators put their lives on the line to dispose of a possible improvised explosive device. Robots can make the disposal process more accurately and saving human lives. For this purpose, there is a demand for more accurate and dexterous manipulating robotic hands that can be teleoperated from a distance. The aim of this project is to design a robotic hand that contains two active and two passive DOF for each finger, as well as a minimum set of tools for mechanical cutting and screw driving within the same robotic hand. Both hand and toolset, are teleoperated from a distance from a haptic robotic glove in order to manipulate dangerous objects such as improvised explosive devices. SolidWorks® Computer-Aided Design, computerized dynamic simulation, and MATLAB® kinematic and static analysis were used for the robotic hand and toolset design. Novel, dexterous and robust solutions for the fingers were obtained, and six servo motors are used in total to remotely control the multi-tooled robotic hand. This project is still undergoing and presents currents results. Future research steps are also presented.

Keywords: Explosive Manipulation, Robotic Hand, Tele-Operation, Tool Integration

Procedia PDF Downloads 111
27198 Context Aware Anomaly Behavior Analysis for Smart Home Systems

Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu

Abstract:

The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.

Keywords: Internet of Things, network security, context awareness, intrusion detection

Procedia PDF Downloads 149
27197 The Intention to Use Telecare in People of Fall Experience: Application of Fuzzy Neural Network

Authors: Jui-Chen Huang, Shou-Hsiung Cheng

Abstract:

This study examined their willingness to use telecare for people who have had experience falling in the last three months in Taiwan. This study adopted convenience sampling and a structural questionnaire to collect data. It was based on the definition and the constructs related to the Health Belief Model (HBM). HBM is comprised of seven constructs: perceived benefits (PBs), perceived disease threat (PDT), perceived barriers of taking action (PBTA), external cues to action (ECUE), internal cues to action (ICUE), attitude toward using (ATT), and behavioral intention to use (BI). This study adopted Fuzzy Neural Network (FNN) to put forward an effective method. It shows the dependence of ATT on PB, PDT, PBTA, ECUE, and ICUE. The training and testing data RMSE (root mean square error) are 0.028 and 0.166 in the FNN, respectively. The training and testing data RMSE are 0.828 and 0.578 in the regression model, respectively. On the other hand, as to the dependence of ATT on BI, as presented in the FNN, the training and testing data RMSE are 0.050 and 0.109, respectively. The training and testing data RMSE are 0.529 and 0.571 in the regression model, respectively. The results show that the FNN method is better than the regression analysis. It is an effective and viable good way.

Keywords: fall, fuzzy neural network, health belief model, telecare, willingness

Procedia PDF Downloads 157
27196 From the Local to the Global: New Terrorism

Authors: Shamila Ahmed

Abstract:

The paper examines how the fluidity between the local level and the global level is an intrinsic feature of new terrorism. Through using cosmopolitanism, the narratives of the two opposing sides of ISIS and the ‘war on terrorism’ response are explored. It is demonstrated how the fluidity between these levels facilitates the radicalisation process through exploring how groups such as ISIS highlight the perceived injustices against Muslims locally and globally and therefore exploit the globalisation process which has reduced the space between these levels. Similarly, it is argued that the ‘war on terror’ involves the intersection of fear, security, threat, risk and social control as features of both the international ‘war on terror’ and intra state policies.

Keywords: terrorism, war on terror, cosmopolitanism, global level terrorism

Procedia PDF Downloads 552
27195 Oral Toxicity of Low Doses of Fungicides, Propinebe, Propiconazole and Their Mixtures in the Male Rat

Authors: Mallem Leila, Aiche Mohamed Amine, Boulakoud Mohamed Salah

Abstract:

A number of chemical compounds are being used to protect agricultural crops from diseases. Residues of these chemicals lead to environmental pollution and pose some threat to non target organisms, human and animal. The aim of this study is to detect the toxicity of these fungicides and their mixtures in the fertility and biochemical’s parameters in the rat. The male of rats (28) were used, they were divided in four groups (7 rats of each group) and one group was used as control. Rats were dosed orally with propiconazole (60 mg/kg body weight/day), propinebe (100 mg/Kg body weight/day) and their mixture (50:50) for 4 weeks. Animals were observed for clinical toxicity. At the end of treatment period, animals of all groups were scarified and samples of different organs were fixed in the formol 10% for histopathological study, and blood was collected for hematological and biochemical’s analysis. The results indicated that the fungicide and their mixture of fungicides were toxic in the treated animals. The semen study showed a decrease in the count, mobility and speed of spermatozoa in all treated group especially those dosed with the mixture and Propiconazole, it was also a decrease in the weight of the testis and epidydimis in the treated group as compared with control. Remarquable histological changes were observed in the testis and epidydimis and liver in the group treated with mixture.

Keywords: fungicides, mixture, fertility, hematological, biochemical's parameters

Procedia PDF Downloads 534
27194 Erosion Influencing Factors Analysis: Case of Isser Watershed (North-West Algeria)

Authors: Chahrazed Salhi, Ayoub Zeroual, Yasmina Hamitouche

Abstract:

Soil water erosion poses a significant threat to the watersheds in Algeria today. The degradation of storage capacity in large dams over the past two decades, primarily due to erosion, necessitates a comprehensive understanding of the factors that contribute to soil erosion. The Isser watershed, located in the Northwestern region of Algeria, faces additional challenges such as recurrent droughts and the presence of delicate marl and clay outcrops, which amplify its susceptibility to water erosion. This study aims to employ advanced techniques such as Geographic Information Systems (GIS) and Remote Sensing (RS), in conjunction with the Canonical Correlation Analysis (CCA) method and Soil Water Assessment Tool (SWAT) model, to predict specific erosion patterns and analyze the key factors influencing erosion in the Isser basin. To accomplish this, an array of data sources including rainfall, climatic, hydrometric, land use, soil, digital elevation, and satellite data were utilized. The application of the SWAT model to the Isser basin yielded an average annual soil loss of approximately 16 t/ha/year. Particularly high erosion rates, exceeding 12 T/ha/year, were observed in the central and southern parts of the basin, encompassing 41% of the total basin area. Through Canonical Correlation Analysis, it was determined that vegetation cover and topography exerted the most substantial influence on erosion. Consequently, the study identified significant and spatially heterogeneous erosion throughout the study area. The impact of land topography on soil loss was found to be directly proportional, while vegetation cover exhibited an inverse proportional relationship. Modeling specific erosion for the Ladrat dam sub-basin estimated a rate of around 39 T/ha/year, thus accounting for the recorded capacity loss of 17.80% compared to the bathymetric survey conducted in 2019. The findings of this research provide valuable decision-support tools for soil conservation managers, empowering them to make informed decisions regarding soil conservation measures.

Keywords: Isser watershed, RS, CCA, SWAT, vegetation cover, topography

Procedia PDF Downloads 37
27193 Eco-Survivalism and Nomadic Pastoralism: An Exploratory Study on the Dialectics of Herder-Farmer Conflict in Nigeria

Authors: Francis N. Okpaleke

Abstract:

The threat of Fulani herder militancy in Nigeria has led to a volatile security situation characterized by communal strife, arms proliferation, rural banditry, and insurgency. The exigency of this situation resonates in the eco-survivalist theory of farmer-herder conflict which holds that the herder deems the farmers’ unwarranted incursions into his grazing terrain as an effrontery that must reprised and a call to war. In spite of the rising incidence of Fulani militancy in Nigeria, only little is known concerning the phenomenon. The bulk of prevailing ideas on the subject has been largely and unnecessarily journalistic and anecdotal, lacking in intellectual depth, fecundity and rigour. The issue has remained scarcely documented by way of organized research. There is therefore a need for a systematic investigation that would leverage scholarly and policy insights on the subject which is the purpose of this study. The study will therefore, seek to examine the nexus between nomadic pastoralism and the incidence of herder-farmer conflicts in Nigeria with particular reference to the central region of the country. By means of qualitative descriptive analysis predicated on the theory of eco-violence, the paper explores the contemporary historical and structural drivers of this conflict, its relationship with the dynamics of climate change in Nigeria and its implication of human security in Nigeria. The paper also proffers theoretical and policy recommendations to mitigate the onto ward conflict.

Keywords: eco-survivalism, conflict, pastoralism, nomads

Procedia PDF Downloads 274
27192 Interest Charges and Sustainability Challenges: The Case of OECD Countries

Authors: Aime Philombe Zapji Ymele

Abstract:

Servicing public debt is a significant budgetary burden. In the sense that the payment of interest charges is a liability on the balance sheet of the public budget and affects fiscal policy. Interest charges can sometimes become a burden if they crowd out private activities. In order to analyse and understand the determinants of the debt burden and its impact on the sustainability of public finances, the present work focuses on OECD countries. It is noted from the literature that the factors that determine interest charges are macroeconomic (inflation, GDP growth, and interest rates) and public finances (primary balance and public debt). After analysing a panel of 33 OECD countries and using ordinary least squares (OLS), we find that public debt, inflation, and long-term interest rates are positively correlated with interest charges. An increase in any of these variables leads to an increase in debt charges. On the other hand, a growth in GDP is negatively associated with interest charges. Indeed, an increase in GDP generates enough revenue to meet the repayment of debt charges. According to the empirical analysis, we can say that, despite the large and growing debt-to-GDP ratio of major OECD countries, interest charges are not a threat to the sustainability of public finances. However, it is important for these countries to reduce the ratio of public debt to GDP because, in the face of the many challenges (health, aging population, etc.) that are looming on the horizon, an increase in interest rates could bring with it considerable burdens that would threaten the budgetary balance of these states.

Keywords: interest charges, sustainability, public debt, interest rates

Procedia PDF Downloads 96
27191 DOS and DDOS Attacks

Authors: Amin Hamrahi, Niloofar Moghaddam

Abstract:

Denial of Service is for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Denial of Service (DoS) attacks have become a major threat to current computer networks. Many recent DoS attacks were launched via a large number of distributed attacking hosts in the Internet. These attacks are called distributed denial of service (DDoS) attacks. To have a better understanding on DoS attacks, this article provides an overview on existing DoS and DDoS attacks and major defense technologies in the Internet.

Keywords: denial of service, distributed denial of service, traffic, flooding

Procedia PDF Downloads 362
27190 Comprehensive Review of Adversarial Machine Learning in PDF Malware

Authors: Preston Nabors, Nasseh Tabrizi

Abstract:

Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.

Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion

Procedia PDF Downloads 14
27189 On the Use of Machine Learning for Tamper Detection

Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode

Abstract:

The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.

Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT

Procedia PDF Downloads 120
27188 Interest Charges and Sustainability Challenges: The Case of OECD Countries

Authors: Zapji Ymele Aime Philombe

Abstract:

Servicing public debt is a significant budgetary burden in the sense that the payment of interest charges is a liability on the balance sheet of the public budget and affects fiscal policy. Interest charges can sometimes become a burden if they crowd out private activities. In order to analyse and understand the determinants of the debt burden and its impact on the sustainability of public finances, the present work focuses on OECD countries. It is noted from the literature that the factors that determine interest charges are macroeconomic (inflation, GDP growth and interest rates) and public finances (primary balance and public debt). After analysing a panel of 33 OECD countries and using ordinary least squares (OLS), we find that public debt, inflation and long-term interest rates are positively correlated with interest charges. An increase in any of these variables leads to an increase in debt charges. On the other hand, a growth in GDP is negatively associated with interest charges. Indeed, an increase in GDP generates enough revenue to meet the repayment of debt charges. According to the empirical analysis, we can say that, despite the large and growing debt-to-GDP ratio of major OECD countries, interest charges are not a threat to the sustainability of public finances. However, it is important for these countries to reduce the ratio of public debt to GDP because, in the face of the many challenges (health, aging population, etc.) that are looming on the horizon, an increase in interest rates could bring with it considerable burdens that would threaten the budgetary balance of these states.

Keywords: interests charges, public debt, sustainability, interest rates

Procedia PDF Downloads 95
27187 European Prosecutor's Office: Chances and Threats; Brief to Polish Perspective

Authors: Katarzyna Stoklosa

Abstract:

Introduction: European Public Prosecutor’s Office (EPPO) is an independent office in European Union which was established under the article 86 of the Treaty on the Functioning of the European Union by the Treaty of Lisbon following the method of enhanced cooperation. EPPO is aimed at combating crimes against the EU’s financial interest et fraud against the EU budgets on the one hand, EPPO will give a chance to effective fight with organized criminality, on the other it seems to be a threat for member-states which bound with justice the problem of sovereignty. It is a new institution that will become effective from 2020, which is why it requires prior analysis. Methodology: The author uses statistical and comparative methods by collecting and analyzing the work of current institutions such as Europol, Eurojust, as well as the future impact of EPPO on detection and prosecution of crimes. The author will also conduct questionnaire among students and academic staff involved in the perception of EU institutions and the need to create new entities dealing with inter-agency cooperation in criminal matters. Thanks to these research the author will draw up present ways of cooperation between member-states and changes in fighting with financial crimes which will grow up under new regulation. Major Finding of the Study: Analysis and research show that EPPO is an institution based on the principle of mutual recognition, which often does not work in cooperation between Member States. Distrust and problems with the recognition of judgments of other EU Member States may significantly affect the functioning of EPPO. Poland is not part of the EPPO, because arguments have been raised that the European Public Prosecutor's Office interferes too much with the Member States’ pro-active sovereignty and duplicates competences. The research and analyzes carried out by the author show that EPPO has completely new competences, for example, it may file indictments against perpetrators of financial crimes. However, according to the research carried out by the author, such competences may undermine the sovereignty and the principle of protecting the public order of the EU. Conclusion: After the analysis, it will be possible to set following thesis: EPPO is only possible way to effective fight with organized financial criminality. However in conclusion Polish doubts should not be criticized at all. Institutions as EPPO must properly respect sovereignty of member-states. Even instruments like that cannot provoke political contraventions, because there are no other ways to effective resolving of international criminality problem.

Keywords: criminal trial, economic crimes, European Public Prosecutor's Office, European Union

Procedia PDF Downloads 132
27186 Multi-Residue Analysis (GC-ECD) of Some Organochlorine Pesticides in Commercial Broiler Meat Marketed in Shivamogga City, Karnataka State, India

Authors: L. V. Lokesha, Jagadeesh S. Sanganal, Yogesh S. Gowda, Shekhar, N. B. Shridhar, N. Prakash, Prashantkumar Waghe, H. D. Narayanaswamy, Girish V. Kumar

Abstract:

Organochlorine (OC) insecticides are among the most important organotoxins and make a large group of pesticides. Physicochemical properties of these toxins, especially their lipophilicity, facilitate the absorption and storage of these toxins in the meat thus possess public health threat to humans. The presence of these toxins in broiler meat can be a quantitative and qualitative index for the presence of these toxins in animal bodies, which is attributed to Waste water of irrigation after spraying the crops, contaminated animal feeds with pesticides, polluted air are the potential sources of residues in animal products. Fifty broiler meat samples were collected from different retail outlets of Bengaluru city, Karnataka state, in ice cold conditions and later stored under -20°C until analysis. All the samples were subjected to Gas Chromatograph attached to Electron Capture Detector(GC-ECD, VARIAN make) screening and quantification of OC pesticides viz; Alachlor, Aldrin, Alpha-BHC, Beta-BHC, Dieldrin, Delta-BHC, o,p-DDE, p,p-DDE, o,p-DDD, p,p-DDD, o,p-DDT, p,p-DDT, Endosulfan-I, Endosulfan-II, Endosulfan Sulphate and Lindane(all the standards were procured from Merck). Extraction was undertaken by blending fifty grams (g) of meat sample with 50g Sodium Sulphate anahydrous, 120 ml of n-hexane, 120 ml acetone for 15 mins, extract is washed with distilled water and sample moisture is dried by sodium sulphate anahydrous, partitioning is done with 25 ml petroleum ether, 10 ml acetonitrile and 15 ml n-hexane shake vigorously for two minutes, sample clean up was done with florosil column. The reconstituted samples (using n-hexane) (Merck chem) were injected to Gas Chromatograph–Electron Capture Detector(GC-ECD). The present study reveals that, among the fifty chicken samples subjected for analysis, 60% (15/50), 32% (8/50), 28% (7/50), 20% (5/50) and 16% (4/50) of samples contaminated with DDTs, Delta-BHC, Dieldrin, Aldrin and Alachlor respectively. DDT metabolites, Delta-BHC were the most frequently detected OC pesticides. The detected levels of the pesticides were below the levels of MRL(according to Export Council of India notification for fresh poultry meat).

Keywords: accuracy, gas chromatography, meat, pesticide, petroleum ether

Procedia PDF Downloads 292
27185 A Mathematical Analysis of Behavioural Epidemiology: Drugs Users Transmission Dynamics Based on Level Education for Susceptible Population

Authors: Firman Riyudha, Endrik Mifta Shaiful

Abstract:

The spread of drug users is one kind of behavioral epidemiology that becomes a threat to every country in the world. This problem caused various crisis simultaneously, including financial or economic crisis, social, health, until human crisis. Most drug users are teenagers at school age. A new deterministic model would be constructed to determine the dynamics of the spread of drug users by considering level of education in a susceptible population. Based on the analytical model, two equilibria points were obtained; there were E₀ (zero user) and E₁ (endemic equilibrium). Existence of equilibrium and local stability of equilibria depended on the Basic Reproduction Ratio (R₀). This parameter was defined as the expected rate of secondary prevalence and primary prevalence in virgin population along spreading primary prevalence. The zero-victim equilibrium would be locally asymptotically stable if R₀ < 1 while if R₀ > 1 the endemic equilibrium would be locally asymptotically stable. The result showed that R₀ was proportional to the rate of interaction of each susceptible population based on educational level with the users' population. It is concluded that there was a need to be given a control in interaction, so that drug users population could be minimized. Numerical simulations were also provided to support analytical results.

Keywords: drugs users, level education, mathematical model, stability

Procedia PDF Downloads 446
27184 Developing Cyber Security Asset Mangement Framework for UK Rail

Authors: Shruti Kohli

Abstract:

The sophistication and pervasiveness of cyber-attacks are constantly growing, driven partly by technological progress, profitable applications in organized crime and state-sponsored innovation. The modernization of rail control systems has resulted in an increasing reliance on digital technology and increased the potential for security breaches and cyber-attacks. This research track showcases the need for developing a secure reusable scalable framework for enhancing cyber security of rail assets. A cyber security framework has been proposed that is being developed to detect the tell-tale signs of cyber-attacks against industrial assets.

Keywords: cyber security, rail asset, security threat, cyber ontology

Procedia PDF Downloads 404
27183 Effects of Wind Load on the Tank Structures with Various Shapes and Aspect Ratios

Authors: Doo Byong Bae, Jae Jun Yoo, Il Gyu Park, Choi Seowon, Oh Chang Kook

Abstract:

There are several wind load provisions to evaluate the wind response on tank structures such as API, Euro-code, etc. the assessment of wind action applying these provisions is made by performing the finite element analysis using both linear bifurcation analysis and geometrically nonlinear analysis. By comparing the pressure patterns obtained from the analysis with the results of wind tunnel test, most appropriate wind load criteria will be recommended.

Keywords: wind load, finite element analysis, linear bifurcation analysis, geometrically nonlinear analysis

Procedia PDF Downloads 600