Search results for: vulnerability
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 659

Search results for: vulnerability

419 Hospital Evacuation: Best Practice Recommendations

Authors: Ronald Blough

Abstract:

Hospitals, clinics, and medical facilities are the core of the Health Services sector providing 24/7 medical care to those in need. Any disruption of these important medical services highlights the vulnerabilities in the medical system. An internal or external event can create a catastrophic incident paralyzing the medical services causing the facility to shift into emergency operations with the possibility of evacuation. The hospital administrator and government officials must decide in a very short amount of time whether to shelter in place or evacuate. This presentation will identify best practice recommendations regarding the hospital evacuation decision and response analyzing previous hospital evacuations to encourage hospitals in the region to review or develop their own emergency evacuation plans.

Keywords: disaster preparedness, hospital evacuation, shelter-in-place, incident containment, health services vulnerability, hospital resources

Procedia PDF Downloads 334
418 Coastal Resources Spatial Planning and Potential Oil Risk Analysis: Case Study of Misratah’s Coastal Resources, Libya

Authors: Abduladim Maitieg, Kevin Lynch, Mark Johnson

Abstract:

The goal of the Libyan Environmental General Authority (EGA) and National Oil Corporation (Department of Health, Safety & Environment) during the last 5 years has been to adopt a common approach to coastal and marine spatial planning. Protection and planning of the coastal zone is a significant for Libya, due to the length of coast and, the high rate of oil export, and spills’ potential negative impacts on coastal and marine habitats. Coastal resource scenarios constitute an important tool for exploring the long-term and short-term consequences of oil spill impact and available response options that would provide an integrated perspective on mitigation. To investigate that, this paper reviews the Misratah coastal parameters to present the physical and human controls and attributes of coastal habitats as the first step in understanding how they may be damaged by an oil spill. This paper also investigates costal resources, providing a better understanding of the resources and factors that impact the integrity of the ecosystem. Therefore, the study described the potential spatial distribution of oil spill risk and the coastal resources value, and also created spatial maps of coastal resources and their vulnerability to oil spills along the coast. This study proposes an analysis of coastal resources condition at a local level in the Misratah region of the Mediterranean Sea, considering the implementation of coastal and marine spatial planning over time as an indication of the will to manage urban development. Oil spill contamination analysis and their impact on the coastal resources depend on (1) oil spill sequence, (2) oil spill location, (3) oil spill movement near the coastal area. The resulting maps show natural, socio-economic activity, environmental resources along of the coast, and oil spill location. Moreover, the study provides significant geodatabase information which is required for coastal sensitivity index mapping and coastal management studies. The outcome of study provides the information necessary to set an Environmental Sensitivity Index (ESI) for the Misratah shoreline, which can be used for management of coastal resources and setting boundaries for each coastal sensitivity sectors, as well as to help planners measure the impact of oil spills on coastal resources. Geographic Information System (GIS) tools were used in order to store and illustrate the spatial convergence of existing socio-economic activities such as fishing, tourism, and the salt industry, and ecosystem components such as sea turtle nesting area, Sabkha habitats, and migratory birds feeding sites. These geodatabases help planners investigate the vulnerability of coastal resources to an oil spill.

Keywords: coastal and marine spatial planning advancement training, GIS mapping, human uses, ecosystem components, Misratah coast, Libyan, oil spill

Procedia PDF Downloads 335
417 A Correlational Study between Parentification and Memory Retention among Parentified Female Adolescents: A Neurocognitive Perspective on Parentification

Authors: Mary Dorothy Roxas, Jeian Mae Dungca, Reginald Agor, Beatriz Figueroa, Lennon Andre Patricio, Honey Joy Cabahug

Abstract:

Parentification occurs when children are expected to provide instrumental or emotional caregiving within the family. It was found that parentification has the latter effect on adolescents’ cognitive and emotional vulnerability. Attachment theory helps clarify the process of parentification as it involves the relationship between the child and the parent. Carandang theory of “taga-salo” helps explain parentification in the Philippines setting. The present study examined the potential risk of parentification on adolescent’s memory retention by hypothesizing that there is a correlation between the two. The research was conducted with 249 female adolescents ages 12-24, residing in Valenzuela City. Results indicated that there is a significant inverse correlation between parentification and memory retention.

Keywords: memory retention, neurocognitive, parentification, stress

Procedia PDF Downloads 550
416 Deforestation, Vulnerability and Adaptation Strategies of Rural Farmers: The Case of Central Rift Valley Region of Ethiopia

Authors: Dembel Bonta Gebeyehu

Abstract:

In the study area, the impacts of deforestation for environmental degradation and livelihood of farmers manifest in different faces. They are more vulnerable as they depend on rain-fed agriculture and immediate natural forests. On the other hand, after planting seedling, waste disposal and management system of the plastic cover is poorly practiced and administered in the country in general and in the study area in particular. If this situation continues, the plastic waste would also accentuate land degradation. Besides, there is the absence of empirical studies conducted comprehensively on the research under study the case. The results of the study could suffice to inform any intervention schemes or to contribute to the existing knowledge on these issues. The study employed a qualitative approach based on intensive fieldwork data collected via various tools namely open-ended interviews, focus group discussion, key-informant interview and non-participant observation. The collected data was duly transcribed and latter categorized into different labels based on pre-determined themes to make further analysis. The major causes of deforestation were the expansion of agricultural land, poor administration, population growth, and the absence of conservation methods. The farmers are vulnerable to soil erosion and soil infertility culminating in low agricultural production; loss of grazing land and decline of livestock production; climate change; and deterioration of social capital. Their adaptation and coping strategies include natural conservation measures, diversification of income sources, safety-net program, and migration. Due to participatory natural resource conservation measures, soil erosion has been decreased and protected, indigenous woodlands started to regenerate. These brought farmers’ attitudinal change. The existing forestation program has many flaws. Especially, after planting seedlings, there is no mechanism for the plastic waste disposal and management. It was also found out organizational challenges among the mandated offices In the studied area, deforestation is aggravated by a number of factors, which made the farmers vulnerable. The current forestation programs are not well-planned, implemented, and coordinated. Sustainable and efficient seedling plastic cover collection and reuse methods should be devised. This is possible through creating awareness, organizing micro and small enterprises to reuse, and generate income from the collected plastic etc.

Keywords: land-cover and land-dynamics, vulnerability, adaptation strategy, mitigation strategies, sustainable plastic waste management

Procedia PDF Downloads 352
415 Strategic Workplace Security: The Role of Malware and the Threat of Internal Vulnerability

Authors: Modesta E. Ezema, Christopher C. Ezema, Christian C. Ugwu, Udoka F. Eze, Florence M. Babalola

Abstract:

Some employees knowingly or unknowingly contribute to loss of data and also expose data to threat in the process of getting their jobs done. Many organizations today are faced with the challenges of how to secure their data as cyber criminals constantly devise new ways of attacking the organization’s secret data. However, this paper enlists the latest strategies that must be put in place in order to protect these important data from being attacked in a collaborative work place. It also introduces us to Advanced Persistent Threats (APTs) and how it works. The empirical study was conducted to collect data from the employee in data centers on how data could be protected from malicious codes and cyber criminals and their responses are highly considered to help checkmate the activities of malicious code and cyber criminals in our work places.

Keywords: data, employee, malware, work place

Procedia PDF Downloads 351
414 Modeling of Tsunami Propagation and Impact on West Vancouver Island, Canada

Authors: S. Chowdhury, A. Corlett

Abstract:

Large tsunamis strike the British Columbia coast every few hundred years. The Cascadia Subduction Zone, which extends along the Pacific coast from Vancouver Island to Northern California is one of the most seismically active regions in Canada. Significant earthquakes have occurred in this region, including the 1700 Cascade Earthquake with an estimated magnitude of 9.2. Based on geological records, experts have predicted a 'great earthquake' of a similar magnitude within this region may happen any time. This earthquake is expected to generate a large tsunami that could impact the coastal communities on Vancouver Island. Since many of these communities are in remote locations, they are more likely to be vulnerable, as the post-earthquake relief efforts would be impacted by the damage to critical road infrastructures. To assess the coastal vulnerability within these communities, a hydrodynamic model has been developed using MIKE-21 software. We have considered a 500 year probabilistic earthquake design criteria including the subsidence in this model. The bathymetry information was collected from Canadian Hydrographic Services (CHS), and National Oceanic Atmospheric and Administration (NOAA). The arial survey was conducted using a Cessna-172 aircraft for the communities, and then the information was converted to generate a topographic digital elevation map. Both survey information was incorporated into the model, and the domain size of the model was about 1000km x 1300km. This model was calibrated with the tsunami occurred off the west coast of Moresby Island on October 28, 2012. The water levels from the model were compared with two tide gauge stations close to the Vancouver Island and the output from the model indicates the satisfactory result. For this study, the design water level was considered as High Water Level plus the Sea Level Rise for 2100 year. The hourly wind speeds from eight directions were collected from different wind stations and used a 200-year return period wind speed in the model for storm events. The regional model was set for 12 hrs simulation period, which takes more than 16 hrs to complete one simulation using double Xeon-E7 CPU computer plus a K-80 GPU. The boundary information for the local model was generated from the regional model. The local model was developed using a high resolution mesh to estimate the coastal flooding for the communities. It was observed from this study that many communities will be effected by the Cascadia tsunami and the inundation maps were developed for the communities. The infrastructures inside the coastal inundation area were identified. Coastal vulnerability planning and resilient design solutions will be implemented to significantly reduce the risk.

Keywords: tsunami, coastal flooding, coastal vulnerable, earthquake, Vancouver, wave propagation

Procedia PDF Downloads 105
413 The Act of Care: Reimagined Rituals towards Unattachment

Authors: Ioana G. Turcan

Abstract:

reimagined rituals towards unattachment wants to look at an ambiguous loss through the perspective of caregivers, those that accompany us at the beginning and possibly the end of life, those that observe, accumulate, and are impacted by our behavior and needs, but also those that are the witnesses of the human vulnerability. Someone taking care of a patient with dementia experiences ambiguous loss, being in a present of a person partially present, partially absent. The one offering care needs care, not isolation and the aim of the project is to consolidate existing communities or engage other possible ones using performance, storytelling, and other artistic methods. The long-term aim is that with community work, we will manage to co-create rituals in order to help us live with this kind of loss. Looking at them through the lens of different cultures and individuals exercises both the ability to extract the universal essence of a ritual, but also the need and freedom to express the specificity of each situation. To be seen and acknowledged by others, but more importantly, to see oneself from outside with dignity, is very powerful. Oftentimes we forget to express, look and appreciate our own stories, and instead, we choose to outcast them.

Keywords: grief, socio-politics of loss, ambiguous loss, rituals

Procedia PDF Downloads 146
412 Intimate Femicide–Suicide in Israel: The Role of Migration and the Context

Authors: Revital Sela-Shayovitz

Abstract:

The current study examined the nature, the characteristics and the extent of intimate femicide followed by suicide (femicide-suicide) in Israel between the years 2005 – 2014. Data were collected from the Israeli organization ‘No to Violence Against Women’ and from two daily and widely-read newspapers in Israel. The findings indicated that migration is a risk factor for intimate femicide-suicide: the majority of the cases occurred among immigrants (59%). Moreover, the vulnerability of Ethiopian immigrants is very high in comparison to the other groups in Israeli society. The dominant motives were the victim's desire for separation and arguments between partners. The main methods used were firearms and stabbing followed by hanging. Furthermore, a prior report about violence was documented in 37% of the cases. The paper discusses these findings in the context of the existing research, offers directions for future research, and suggests some response strategies.

Keywords: ethnicity, immigrants, intimate femicide, suicide

Procedia PDF Downloads 123
411 Factors Influencing the Uptake of Vaccinations amongst Pregnant Women Following the COVID-19 Pandemic

Authors: Jo Parsons, Cath Grimley, Debra Bick, Sarah Hillman, Louise Clarke, Helen Atherton

Abstract:

The problem: Vaccinations are routinely offered to pregnant women in the UK for influenza (flu), pertussis (whooping cough), and COVID-19, yet the uptake of these vaccinations in pregnancy remains low. Pregnant women are at increased risk of hospitalisation, morbidity, and mortality from these preventable illnesses, which can also expose their unborn babies to an increased risk of serious complications, including in utero death. This research aims to explore how pregnant women feel about vaccinations offered during pregnancy (flu, whooping cough, and COVID-19), particularly following the COVID-19 pandemic. It also aims to examine factors influencing women’s decisions about vaccinations during pregnancy and how they feel about their health and vulnerabilities to illness arising from the COVID-19 pandemic. The approach: This is a qualitative study involving semi-structured interviews with pregnant women and midwives in the UK. Interviews with pregnant women explored their views since the COVID-19 pandemic about vaccinations offered during pregnancy and whether the pandemic has influenced perceptions of vulnerability to illness in pregnant women. Interviews with midwives explored vaccination discussions they routinely have with pregnant women and identified some of the barriers to vaccination that pregnant women discuss with them. Pregnant women were recruited via participating hospitals and community groups. Midwives were recruited via participating hospitals and midwife-specific social media groups. All interviews were conducted remotely (using telephone or Microsoft Teams) and analysed using thematic analysis. Findings: 43 pregnant women and 16 midwives were recruited and interviewed. The findings presented will focus on data from pregnant women. Pregnant women reported a wide range of views and vaccination behaviour, and identified several factors influencing their decision whether to accept vaccinations or not. These included internal factors (comprised of beliefs about susceptibility to illness, perceptions of immunity, fear, and feelings of responsibility), other influences (including visibility of illness and external influences such as healthcare professional recommendations), vaccination-related factors (comprised of beliefs about effectiveness and safety of vaccinations, availability and accessibility of vaccinations and preferences for alternative forms of protection to vaccination) and COVID-19 specific factors (including COVID-19 vaccinations and COVID-19 specific influences). Implications: Findings identified some of the factors that affect pregnant women’s decisions when deciding to have a vaccination or not and how these decisions have been influenced by COVID-19. Findings highlight areas where healthcare professional advice needs to focus, such as the provision of information about the increased vulnerability to illnesses during pregnancy and consideration of opportunistic vaccination at hospital appointments to maximise uptake of vaccinations during pregnancy. Findings of this study will inform the development of an intervention to increase vaccination uptake amongst pregnant women.

Keywords: vaccination, pregnancy, qualitative, interviews, COVID-19

Procedia PDF Downloads 56
410 Formal Verification for Ethereum Smart Contract Using Coq

Authors: Xia Yang, Zheng Yang, Haiyong Sun, Yan Fang, Jingyu Liu, Jia Song

Abstract:

The smart contract in Ethereum is a unique program deployed on the Ethereum Virtual Machine (EVM) to help manage cryptocurrency. The security of this smart contract is critical to Ethereum’s operation and highly sensitive. In this paper, we present a formal model for smart contract, using the separated term-obligation (STO) strategy to formalize and verify the smart contract. We use the IBM smart sponsor contract (SSC) as an example to elaborate the detail of the formalizing process. We also propose a formal smart sponsor contract model (FSSCM) and verify SSC’s security properties with an interactive theorem prover Coq. We found the 'Unchecked-Send' vulnerability in the SSC, using our formal model and verification method. Finally, we demonstrate how we can formalize and verify other smart contracts with this approach, and our work indicates that this formal verification can effectively verify the correctness and security of smart contracts.

Keywords: smart contract, formal verification, Ethereum, Coq

Procedia PDF Downloads 645
409 Visual Odometry and Trajectory Reconstruction for UAVs

Authors: Sandro Bartolini, Alessandro Mecocci, Alessio Medaglini

Abstract:

The growing popularity of systems based on unmanned aerial vehicles (UAVs) is highlighting their vulnerability, particularly in relation to the positioning system used. Typically, UAV architectures use the civilian GPS, which is exposed to a number of different attacks, such as jamming or spoofing. This is why it is important to develop alternative methodologies to accurately estimate the actual UAV position without relying on GPS measurements only. In this paper, we propose a position estimate method for UAVs based on monocular visual odometry. We have developed a flight control system capable of keeping track of the entire trajectory travelled, with a reduced dependency on the availability of GPS signals. Moreover, the simplicity of the developed solution makes it applicable to a wide range of commercial drones. The final goal is to allow for safer flights in all conditions, even under cyber-attacks trying to deceive the drone.

Keywords: visual odometry, autonomous uav, position measurement, autonomous outdoor flight

Procedia PDF Downloads 186
408 The Role of Leapfrogging: Cross-Level Interactions and MNE Decision-Making in Conflict-Settings

Authors: Arrian Cornwell, Larisa Yarovaya, Mary Thomson

Abstract:

This paper seeks to examine the transboundary nature of foreign subsidiary exit vs. stay decisions when threatened by conflict in a host country. Using the concepts of nested vulnerability and teleconnections, we show that the threat of conflict can transcend bounded territories and have non-linear outcomes for actors, institutions and systems at broader scales of analysis. To the best of our knowledge, this has not been done before. By introducing the concepts of ‘leapfrogging upwards’ and ‘cascading downwards’, we develop a two-stage model which characterises the impacts of conflict as transboundary phenomena. We apply our model to a dataset of 266 foreign subsidiaries in six conflict-afflicted host countries over 2011-2015. Our results indicate that information is transmitted upwards and subsequent pressure flows cascade downwards, which, in turn, influence exit decisions.

Keywords: subsidiary exit, conflict, information transmission, pressure flows, transboundary

Procedia PDF Downloads 233
407 Sexual and Reproductive Rights After the Signing of the Peace Process: A Territorial Commitment

Authors: Rocio Murad, Juan Carlos Rivillas, Nury Alejandra Rodriguez, Daniela Roldán

Abstract:

In Colombia, around 5 million women have suffered forced displacement and all forms of gender-based violence, mostly adolescents and young women, single mothers, or widows with children affected by the war. After the signing of the peace agreements, the department of Antioquia has been one of the most affected by the armed conflict, from a territorial and gender perspective in the period. The objective of the research was to analyze the situation of sexual and reproductive rights in the department of Antioquia from a territorial and gender perspective in the period after the signing of the Peace Agreement. A mixed methodology was developed. The quantitative component conducted a cross-sectional descriptive study of barriers to access to contraceptive methods, safe abortion and gender-based violence based on microdata from the 2015 National Demographic and Health Survey. In the qualitative component, a case study was developed in Dabeiba, a municipality of Antioquia prioritized in order to deepen the experiences before, during and after the armed conflict in sexual and reproductive rights; using three research techniques: Focused observation, Semi-structured interviews, and Documentary review. The results showed that there is a gradient of greater vulnerability to greater effects of the conflict and that the subregion of Urabá Antioqueño, to which Dabeiba belongs, has the highest levels of vulnerability in relation to departmental data. In this subregion, the percentage of women with an unmet need for contraceptive methods (9%), women with unintended pregnancies (31%), of women between 15 and 19 years of age who are already mothers or are pregnant with their first child (32%) and the percentage of women victims of physical violence (42%) and sexual violence (13%) by their partners are significantly higher. Women, particularly rural and indigenous women, were doubly affected due to the existence of violence that is specifically directed at them or that has a greater impact on their life projects. There was evidence of insufficient, fragmented and disjointed social and institutional action in relation to women's rights and the existence of androcentric and patriarchal social imaginaries through which women and the feminine are undervalued. These results provide evidence of violations of sexual and reproductive rights in contexts of armed conflict and make it possible to identify mechanisms to guarantee the re-establishment of the rights of the victims, particularly women and girls. Among the mechanisms evidenced are: working for the elimination of gender stereotypes; supporting the formation and strengthening of women's social organizations; working for the concerted definition and articulated implementation of actions necessary to respond to sexual and reproductive health needs; and working for the recognition of reproductive violence as specific and different from sexual violence in the context of armed conflict. Also, it was evidenced that it is necessary to implement prevention, attention and reparation actions.

Keywords: sexual and reproductive rights, Colombia, armed conflict, violence against women

Procedia PDF Downloads 57
406 Violence of Tyrant Children to Their Parents: An Interdisciplinary Approach

Authors: Marta Maria Aguilar Carceles, Ginesa Torrente Hernandez

Abstract:

The goal of the current study is focused on giving an interdisciplinary comprehension of an increased phenomenon in recent years: violence against parents. Violence can take different forms depending on the context and the vulnerability of the victims, but in this kind of situations, the relationship between parents and young people can become abusive and uncontrollable. Taking a sample from the Spanish Criminal Courts, this study explores those psychological and sociological factors that can contribute to the appearance and continuity of this kind of behaviors in minors. It is considered factors like the type of offence, presence or absence of psychopathology in the subjects, family aspects, or sociodemographic factors, getting a criminal profile of the minor and evaluating which measures are more efficient or adequate in each particular case. Finally, it will be discussed on how getting effective interventions and restorative responses to address teen violence against their parents within the Spanish Legal System.

Keywords: criminality, legal system, parents, tyrant sons, violence

Procedia PDF Downloads 113
405 Assessing Mycotoxin Exposure from Processed Cereal-Based Foods for Children

Authors: Soraia V. M. de Sá, Miguel A. Faria, José O. Fernandes, Sara C. Cunha

Abstract:

Cereals play a vital role in fulfilling the nutritional needs of children, supplying essential nutrients crucial for their growth and development. However, concerns arise due to children's heightened vulnerability due to their unique physiology, specific dietary requirements, and relatively higher intake in relation to their body weight. This vulnerability exposes them to harmful food contaminants, particularly mycotoxins, prevalent in cereals. Because of the thermal stability of mycotoxins, conventional industrial food processing often falls short of eliminating them. Children, especially those aged 4 months to 12 years, frequently encounter mycotoxins through the consumption of specialized food products, such as instant foods, breakfast cereals, bars, cookie snacks, fruit puree, and various dairy items. A close monitoring of this demographic group's exposure to mycotoxins is essential, as toxins ingestion may weaken children’s immune systems, reduce their resistance to infectious diseases, and potentially lead to cognitive impairments. The severe toxicity of mycotoxins, some of which are classified as carcinogenic, has spurred the establishment and ongoing revision of legislative limits on mycotoxin levels in food and feed globally. While EU Commission Regulation 1881/2006 addresses well-known mycotoxins in processed cereal-based foods and infant foods, the absence of regulations specifically addressing emerging mycotoxins underscores a glaring gap in the regulatory framework, necessitating immediate attention. Emerging mycotoxins have gained mounting scrutiny in recent years due to their pervasive presence in various foodstuffs, notably cereals and cereal-based products. Alarmingly, exposure to multiple mycotoxins is hypothesized to exhibit higher toxicity than isolated effects, raising particular concerns for products primarily aimed at children. This study scrutinizes the presence of 22 mycotoxins of the diverse range of chemical classes in 148 processed cereal-based foods, including 39 breakfast cereals, 25 infant formulas, 27 snacks, 25 cereal bars, and 32 cookies commercially available in Portugal. The analytical approach employed a modified QuEChERS procedure followed by ultra-performance liquid chromatography-tandem mass spectrometry (UPLC-MS/MS) analysis. Given the paucity of information on the risk assessment of children to multiple mycotoxins in cereal and cereal-based products consumed by children of Portugal pioneers the evaluation of this critical aspect. Overall, aflatoxin B1 (AFB1) and aflatoxin G2 (AFG2) emerged as the most prevalent regulated mycotoxins, while enniatin B (ENNB) and sterigmatocystin (STG) were the most frequently detected emerging mycotoxins.

Keywords: cereal-based products, children´s nutrition, food safety, UPLC-MS/MS analysis

Procedia PDF Downloads 31
404 A Custom Convolutional Neural Network with Hue, Saturation, Value Color for Malaria Classification

Authors: Ghazala Hcini, Imen Jdey, Hela Ltifi

Abstract:

Malaria disease should be considered and handled as a potential restorative catastrophe. One of the most challenging tasks in the field of microscopy image processing is due to differences in test design and vulnerability of cell classifications. In this article, we focused on applying deep learning to classify patients by identifying images of infected and uninfected cells. We performed multiple forms, counting a classification approach using the Hue, Saturation, Value (HSV) color space. HSV is used since of its superior ability to speak to image brightness; at long last, for classification, a convolutional neural network (CNN) architecture is created. Clusters of focus were used to deliver the classification. The highlights got to be forbidden, and a few more clamor sorts are included in the information. The suggested method has a precision of 99.79%, a recall value of 99.55%, and provides 99.96% accuracy.

Keywords: deep learning, convolutional neural network, image classification, color transformation, HSV color, malaria diagnosis, malaria cells images

Procedia PDF Downloads 57
403 Optimising GIS in Cushioning the Environmental Impact of Infrastructural Projects

Authors: Akerele Akintunde Hareef

Abstract:

GIS is an integrating tool for storing, retrieving, manipulating, and analyzing spatial data. It is a tool which defines an area with respect to features and other relevant thematic delineations. On the other hand, Environmental Impact Assessment in short is both positive and negative impact of an infrastructure on an environment. Impact of infrastructural projects on the environment is an aspect of development that barely get extensive portion of pre-project execution phase and when they do, the effects are most times not implemented to cushion the impact they have on human and the environment. In this research, infrastructural projects like road constructions, water reticulation projects, building constructions, bridge etc. have immense impact on the environment and the people that reside in location of construction. Hence, the need for this research tends to portray the relevance of Environmental Impact assessment in calculating the vulnerability of human and the environment to imbalance necessitated by this infrastructural development and how the use of GIS application can be optimally applied to annul or minimize the effect.

Keywords: environmental impact assessment (EIA), geographic information system (GIS), infrastructural projects, environment

Procedia PDF Downloads 514
402 Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape

Authors: Sandesh Achar

Abstract:

Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.

Keywords: multi-cloud service, system organization control, data loss prevention, identity and access management

Procedia PDF Downloads 63
401 The Study of Security Techniques on Information System for Decision Making

Authors: Tejinder Singh

Abstract:

Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.

Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data

Procedia PDF Downloads 266
400 A Study on Automotive Attack Database and Data Flow Diagram for Concretization of HEAVENS: A Car Security Model

Authors: Se-Han Lee, Kwang-Woo Go, Gwang-Hyun Ahn, Hee-Sung Park, Cheol-Kyu Han, Jun-Bo Shim, Geun-Chul Kang, Hyun-Jung Lee

Abstract:

In recent years, with the advent of smart cars and the expansion of the market, the announcement of 'Adventures in Automotive Networks and Control Units' at the DEFCON21 conference in 2013 revealed that cars are not safe from hacking. As a result, the HEAVENS model considering not only the functional safety of the vehicle but also the security has been suggested. However, the HEAVENS model only presents a simple process, and there are no detailed procedures and activities for each process, making it difficult to apply it to the actual vehicle security vulnerability check. In this paper, we propose an automated attack database that systematically summarizes attack vectors, attack types, and vulnerable vehicle models to prepare for various car hacking attacks, and data flow diagrams that can detect various vulnerabilities and suggest a way to materialize the HEAVENS model.

Keywords: automotive security, HEAVENS, car hacking, security model, information security

Procedia PDF Downloads 317
399 Links between Landscape Management and Environmental Risk Assessment: Considerations from the Italian Context

Authors: Mara Balestrieri, Clara Pusceddu

Abstract:

Issues relating to the destructive phenomena that can damage people and goods have returned to the centre of debate in Italy with the increase in catastrophic episodes in recent years in a country which is highly vulnerable to hydrological risk. Environmental factors and geological and geomorphological territorial characteristics play an important role in determining the level of vulnerability and the natural tendency to risk. However, a territory has also been subjected to the requirements of and transformations of society, and this brings other relevant factors. The reasons for the increase in destructive phenomena are often to be found in the territorial development models adopted. Stewardship of the landscape and management of risk are related issues. This study aims to summarize the most relevant elements about this connection and at the same time to clarify the role of environmental risk assessment as a tool to aid in the sustainable management of landscape. How planners relate to this problem and which aspects should be monitored in order to prepare responsible and useful interventions?

Keywords: assessment, landscape, risk, planning

Procedia PDF Downloads 434
398 Weaknesses and Performance Defects of Steel Structures According to the Executive Criteria

Authors: Ehsan Sadie

Abstract:

Despite the experience of heavy losses and damages of recent earthquakes such as 8 km E of Pāhala, Hawaii, 11 km W of Salvaleón de Higüey, Dominican Republic and 49 km SSE of Punta Cana, Dominican Republic earthquakes, the possibility of large earthquakes in most populated areas of any country and the serious need for quality control in the design and implementation of buildings, not enough attention has been paid to the proper construction. Steel structures constitute a significant part of construction in any metropolitan area. This article gives a brief overview of the implementation status of these buildings in urban areas and considers the weaknesses of performance that typically occur due to negligence or insufficient mastery of the building supervisor in the principles of operation of earthquake-resistant buildings, and provide appropriate and possible solutions to improve the construction.

Keywords: bracing member, concentrated load, diaphragm system, earthquake engineering, load-bearing system, shear force, seismic retrofitting, steel building, strip foundation, supervising engineer, vulnerability of building

Procedia PDF Downloads 115
397 Climate Change and Economic Performance in Selected Oil-Producing African Countries: A Trend Analysis Approach

Authors: Waheed O. Majekodunmi

Abstract:

Climate change is a real global phenomenon and an unquestionable threat to our quest for a healthy and livable planet. It is now regarded as potentially the most monumental environmental challenge people and the planet will be confronted with over the next centuries. Expectedly, climate change mitigation was one of the central themes of COP 28. Despite contributing the least to climate change, Africa is and remains the hardest hit by the negative consequences of climate change including poor growth performance. Currently, it is being hypothesized that the high level of vulnerability and exposure to climate-related disasters, low adaptive capacity against global warming and high mitigation costs of climate change across the continent could be linked to the recent abysmal economic performance of African countries, especially in oil-producing countries where greenhouse gas emissions, is potentially more prevalent. This paper examines the impact of climate change on the economic performance of selected oil-producing countries in Africa using evidence from Nigeria, Algeria and Angola. The objective of the study is to determine whether or not climate change influences the economic performance of oil-producing countries in Africa by examining the nexus between economic growth and climate-related variables. The study seeks to investigate the effect of climate change on the pace of economic growth in African oil-producing countries. To achieve the research objectives, this study utilizes a quantitative approach by using historical and current secondary data sets to determine the relationship between climate-related variables and economic growth variables in the selected countries. The study employed numbers, percentages, tables and trend graphs to explain the trends or common patterns between climate change, economic growth and determinants of economic growth: governance effectiveness, infrastructure, macroeconomic stability and regulatory efficiency. Results from the empirical analysis of data show that the trends of economic growth and climate-related variables in the selected oil-producing countries are in the opposite directions as the increasing share of renewable energy sources in total energy consumption and the reduction in greenhouse gas emissions per capita in the oil-producing countries did not translate to higher economic growth. Further findings show that annual surface temperatures in the selected countries do not share similar trends with the food imports ratio and GDP per capita annual growth rate suggesting that climate change does not impact significantly agricultural productivity and economic growth in oil-producing countries in Africa. Annual surface temperature was also found to not share a similar pattern with governance effectiveness, macroeconomic stability and regulatory efficiency reinforcing the claim that some economic growth variables are independent of climate change. The policy implication of this research is that oil-producing African countries need to focus more on improving the macroeconomic environment and streamlining governance and institutional processes to boost their economic performance before considering the adoption of climate change adaptation and mitigation strategies.

Keywords: climate change, climate vulnerability, economic growth, greenhouse gas emissions per capita, oil-producing countries, share of renewable energy in total energy consumption

Procedia PDF Downloads 11
396 Adversary Emulation: Implementation of Automated Countermeasure in CALDERA Framework

Authors: Yinan Cao, Francine Herrmann

Abstract:

Adversary emulation is a very effective concrete way to evaluate the defense of an information system or network. It is about building an emulator, which depending on the vulnerability of a target system, will allow to detect and execute a set of identified attacks. However, emulating an adversary is very costly in terms of time and resources. Verifying the information of each technique and building up the countermeasures in the middle of the test is also needed to be accomplished manually. In this article, a synthesis of previous MITRE research on the creation of the ATT&CK matrix will be as the knowledge base of the known techniques and a well-designed adversary emulation software CALDERA based on ATT&CK Matrix will be used as our platform. Inspired and guided by the previous study, a plugin in CALDERA called Tinker will be implemented, which is aiming to help the tester to get more information and also the mitigation of each technique used in the previous operation. Furthermore, the optional countermeasures for some techniques are also implemented and preset in Tinker in order to facilitate and fasten the process of the defense improvement of the tested system.

Keywords: automation, adversary emulation, CALDERA, countermeasures, MITRE ATT&CK

Procedia PDF Downloads 170
395 A Review of Intelligent Fire Management Systems to Reduce Wildfires

Authors: Nomfundo Ngombane, Topside E. Mathonsi

Abstract:

Remote sensing and satellite imaging have been widely used to detect wildfires; nevertheless, the technologies present some limitations in terms of early wildfire detection as the technologies are greatly influenced by weather conditions and can miss small fires. The fires need to have spread a few kilometers for the technologies to provide accurate detection. The South African Advanced Fire Information System uses MODIS (Moderate Resolution Imaging Spectroradiometer) as satellite imaging. MODIS has limitations as it can exclude small fires and can fall short in validating fire vulnerability. Thus in the future, a Machine Learning algorithm will be designed and implemented for the early detection of wildfires. A simulator will be used to evaluate the effectiveness of the proposed solution, and the results of the simulation will be presented.

Keywords: moderate resolution imaging spectroradiometer, advanced fire information system, machine learning algorithm, detection of wildfires

Procedia PDF Downloads 55
394 A Survey on Countermeasures of Cache-Timing Attack on AES Systems

Authors: Settana M. Abdulh, Naila A. Sadalla, Yaseen H. Taha, Howaida Elshoush

Abstract:

Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures.

Keywords: AES algorithm, side channel attack, cache timing attack, cache timing countermeasure

Procedia PDF Downloads 263
393 Finite Element Analysis of the Ordinary Reinforced Concrete Bridge Piers

Authors: Nabin Raj Chaulagain

Abstract:

Most of the concrete bridges in Nepal constructed during 90's and before are made up of low strength ordinary concrete which might be one of the reasons for damage in higher magnitude earthquake. Those bridges were designed by the outdated bridge codes which might not account the large seismic loads. This research investigates the seismic vulnerability of the existing single column ordinary concrete bridge pier by finite element modeling, using the software Seismostruct. The existing bridge pier capacity has been assessed using nonlinear pushover analysis and performance is compared after retrofitting those pier models with CFRP. Furthermore, the seismic evaluation was made by conducting cyclic loading test at different drift percentage. The performance analysis of bridge pier by nonlinear pushover analysis is further validated by energy dissipation phenomenon measured from the hysteric loop for each model of ordinary concrete piers.

Keywords: finite element modeling, ordinary concrete bridge pier, performance analysis, retrofitting

Procedia PDF Downloads 288
392 Design of Organic Inhibitors from Quantum Chemistry

Authors: Rahma Tibigui, Ikram Hadj Said, Rachid Belkada, Dalila Hammoutene

Abstract:

The vulnerability of industrial facilities is highly concerned with multiple risks from corrosion. The commonly adopted solution is based on the use of organic inhibitors, which are gradually being replaced by environmentally friendly organic inhibitors. In our work, we carried out a quantum chemical study based on the Density Functional Theory (DFT) method at the B3LYP/6-311G (d,p) level of theory. The inhibitory performance of a derivative of the tetrazole molecule has been investigated and reported as a carbon steel-friendly corrosion inhibitor in hydrochloric acid (HCl) medium. The relationship is likely to exist between the molecular structure of this compound as well as its various global reactivity descriptors, and its corrosion inhibition efficiency, which was examined and then discussed. The results show low values of ΔE, which represent strong adsorption of the inhibitor on the steel surface. Moreover, the flat adsorption orientation confirmed the great ability to donate (accept) electrons to (from) steel, fabricating an anchored barrier to prevent steel from corrosion.

Keywords: eco-friendly, corrosion inhibitors, tetrazole, DFT

Procedia PDF Downloads 202
391 Importance of Remote Sensing and Information Communication Technology to Improve Climate Resilience in Low Land of Ethiopia

Authors: Hasen Keder Edris, Ryuji Matsunaga, Toshi Yamanaka

Abstract:

The issue of climate change and its impact is a major contemporary global concern. Ethiopia is one of the countries experiencing adverse climate change impact including frequent extreme weather events that are exacerbating drought and water scarcity. Due to this reason, the government of Ethiopia develops a strategic document which focuses on the climate resilience green economy. One of the major components of the strategic framework is designed to improve community adaptation capacity and mitigation of drought. For effective implementation of the strategy, identification of regions relative vulnerability to drought is vital. There is a growing tendency of applying Geographic Information System (GIS) and Remote Sensing technologies for collecting information on duration and severity of drought by direct measure of the topography as well as an indirect measure of land cover. This study aims to show an application of remote sensing technology and GIS for developing drought vulnerability index by taking lowland of Ethiopia as a case study. In addition, it assesses integrated Information Communication Technology (ICT) potential of Ethiopia lowland and proposes integrated solution. Satellite data is used to detect the beginning of the drought. The severity of drought risk prone areas of livestock keeping pastoral is analyzed through normalized difference vegetation index (NDVI) and ten years rainfall data. The change from the existing and average SPOT NDVI and vegetation condition index is used to identify the onset of drought and potential risks. Secondary data is used to analyze geographical coverage of mobile and internet usage in the region. For decades, the government of Ethiopia introduced some technologies and approach to overcoming climate change related problems. However, lack of access to information and inadequate technical support for the pastoral area remains a major challenge. In conventional business as usual approach, the lowland pastorals continue facing a number of challenges. The result indicated that 80% of the region face frequent drought occurrence and out of this 60% of pastoral area faces high drought risk. On the other hand, the target area mobile phone and internet coverage is rapidly growing. One of identified ICT solution enabler technology is telecom center which covers 98% of the region. It was possible to identify the frequently affected area and potential drought risk using the NDVI remote-sensing data analyses. We also found that ICT can play an important role in mitigating climate change challenge. Hence, there is a need to strengthen implementation efforts of climate change adaptation through integrated Remote Sensing and web based information dissemination and mobile alert of extreme events.

Keywords: climate changes, ICT, pastoral, remote sensing

Procedia PDF Downloads 276
390 Predicting the Relationship Between Childhood Trauma on the Formation of Defense Mechanisms with the Mediating Role of Object Relations in Traders

Authors: Ahmadreza Jabalameli, Mohammad Ebrahimpour Borujeni

Abstract:

According to psychodynamic theories, the major personality structure of individuals is formed in the first years of life. Trauma is an inseparable and undeniable part of everyone's life and they inevitably struggle with many traumas that can have a very significant impact on their lives. The present study deals with the relationship between childhood trauma on the formation of defense mechanisms and the role of object relations. The present descriptive study is a correlation with structural equation modeling (SEM). Sample selection is available and consists of 200 knowledgeable traders in Jabalameli Information Technology Company. The results indicate that the experience of childhood trauma with a demographic moderating effect, through the mediating role of object relations can lead to vulnerability to ego reality functionality and immature and psychically disturbed defense mechanisms. In this regard, there is a significant negative relationship between childhood trauma and object relations with mature defense mechanisms.

Keywords: childhood trauma, defense mechanisms, object relations, trade

Procedia PDF Downloads 101