592 results on '"Counter measures"'
Search Results
2. Systems resilience assessments: a review, framework and metrics.
- Author
-
Cheng, Yao, Elsayed, Elsayed A., and Huang, Zhiyi
- Subjects
HAZARDS - Abstract
The past several decades have witnessed an increasing number of natural and manmade hazards with a dramatic impact on the normal operations of the society. The occurrences of these hazards manifest a growing trend of uncertainty. Assessing the performance of systems under such hazards is a salient concern of researchers and practitioners. The notion of 'resilience' has been proposed and popularised to characterise system performance deterioration and restoration due to different hazards and threats. Substantial effort has been devoted to quantify and describe resilience from different perspectives. However, there is no generic metric for assessing the resilience of different systems under different hazards. This paper provides a review of existing approaches that quantitatively assess resilience, along with their applicable scenarios and limitations. New general and generic resilience metrics for systems with multimodal performance are proposed. Opportunities for multi-hazard resilience modelling and enhancements are presented. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
3. Uluslararası Hukukta Ekonomik Yaptırımların Hukuka Uygunluğu ve Etkinliği Sorunu.
- Author
-
Keskin, Cenk
- Abstract
Copyright of Public & Private International Law Bulletin is the property of Public & Private International Law Bulletin and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
4. A Review of Smartphone as an Office: Security Risks and Mitigation Measures
- Author
-
Titus Muhambe Mukisa and Julius Murumba
- Subjects
smartphone ,office work ,security threats ,counter measures ,Science ,Technology - Abstract
Smartphones have become the most popular mode of communication as well as a novel mode of work, allowing users to work from anywhere and increasing their efficiency and responsiveness. However, the flexibility and convenience of mobile phones are associated with security risks. The objective of this study was to examine the threats and risks that smartphones face and to suggest mitigation strategies. A literature searches of scientific research articles published in online journals and databases was carried out. Some of the databases used are Google Scholar, IEEE Xplore Digital Library and Science Direct. The paper concludes that smartphones are not only capable of supporting office work but can also serve as a gateway to the Internet of Things (IoT) and a tool for user interaction with numerous electronic devices. This comes with concerns about technical threats associated with cybercrime, privacy infringements, and hidden data collection tendencies. The paper recommends advanced research to enhance counter-measures to mitigate the many existing security threats as well as those that may emerge in the future.
- Published
- 2023
- Full Text
- View/download PDF
5. A Comprehensive Survey of Various Machine Learning Techniques to Counter Security Issues Related to Mobile Malwares.
- Author
-
Jamal, Ahmad, Jaiswal, Rachana, Sayyad, Shabnam, Pandit, Prajjawal, and Sayyad, Farook
- Subjects
MOBILE apps ,MACHINE learning ,CONVOLUTIONAL neural networks ,SUPPORT vector machines ,MALWARE - Abstract
Malware has been used to attack mobile devices since it first appeared. The two main types of independent mobile malware attacks are mobile fraud apps and embedded hazardous apps. If one wishes to successfully fight against the cyber dangers posed by mobile malware, a detailed understanding of the permissions specified in apps and API requests is important. This study uses permission requests and API calls to build a powerful categorization model. Android applications use a wide variety of APIs, therefore we've developed three alternative categorization strategies: ambiguous, dangerous, and disruptive, to make it simpler to identify harmful apps. The findings suggest that dangerous apps employ a different set of API calls than benign ones, which demonstrates that mobile malware frequently requests detrimental permissions to access sensitive data. This article provides a thorough literature evaluation of numerous strategies for addressing android malware and associated security issues. The many techniques used to combat malware in the Android operating system are analysed in this article. According to this study, Support Vector Machine and Convolution Neural Network are the most accurate machine learning algorithms for classifying and predicting malware in the Android operating system. [ABSTRACT FROM AUTHOR]
- Published
- 2022
6. Radio Propagation and RF Channels
- Author
-
Yang, Sung-Moon Michael and Yang, Sung-Moon Michael
- Published
- 2020
- Full Text
- View/download PDF
7. Research on the Establishment of the Evaluation Indicator System for Online Shopping Customers Loyalty
- Author
-
Chen, Jiaying, Lin, Shaojiang, Huang, He, Davim, J Paulo, Series Editor, Xu, Jiuping, editor, Cooke, Fang Lee, editor, Gen, Mitsuo, editor, and Ahmed, Syed Ejaz, editor
- Published
- 2019
- Full Text
- View/download PDF
8. HISTORY OF RELIGIOUS EXTREMISM IN THE MIDDLE EAST.
- Author
-
Andrej, Iliev and Nenad, Taneski
- Subjects
YOUNG adults ,RADICALISM ,TERRORISM ,WORLD War II ,INTERNATIONAL security ,SECTARIAN conflict - Abstract
The origin of World War II was "Nazism", a violent totalitarian ideology that crossed national borders and took the lives of more than 55 million around the world. History very often claimed that ethnically motivated religious violence even between communities practicing the same religion is very usual. The terrorist attack on USA from 11.09.2001 represents a cornstone for expansion of religious extremism which easly developed in different forms of terrorism. Religious extremism offers various challenges at the national, regional and global levels and requires policy makers and practitioners to appreciate the unique nature of these ideologies, many of them seeking the wholesale destruction of civic order as opposed to its reform or even restructuring. Conflicts incited by religious extremism are forcing the displacement of millions people around the world. Middle East as a region is most vurnelable to religious extremism esspecialy among youngsters. Esspecially after 11/09 UN, NATO, EU and other regional and world organization for collective security and defense were focused on developing modern and comman measures for coping with religious extremism. The main research focus of this paper is to give an historical retrospective on development of religious extremism and to gave an comman interoperative and efective measures of UN, NATO and EU for delling with religious extremism. Also the main researching targets of this paper is religious extremism among young people in the Middle East. [ABSTRACT FROM AUTHOR]
- Published
- 2022
9. Pasteur, Vaccines, and the Refusal to Become Fully Vaccinated in the Midst of the COVID-19 Pandemic
- Author
-
Charles S. Pavia
- Subjects
COVID-19 vaccines ,vaccine hesitancy ,counter measures ,public health ,Pasteur ,Public aspects of medicine ,RA1-1270 - Abstract
Vaccines are one of the most effective public health measures that are designed to prevent serious illness caused by a wide variety of infectious agents, which have become especially important in light of the coronavirus disease 2019 (COVID-19) pandemic. Despite the favorable outcomes associated with vaccine development and use, a new wave of hesitancy to get vaccinated has emerged that threatens the control or quick elimination of the highly contagious and life-threatening infection caused by SARS-CoV-2. At the forefront of the current anti-vaccine movement is the dissemination of false and misleading information. This essay explores the primary reasons, which also includes an historical connection, behind this anti-vaccine sentiment, and proposes several possible and realistic interventions that could be implemented to counter this notion and significantly improve vaccine acceptance, especially among young people.
- Published
- 2022
- Full Text
- View/download PDF
10. Operating room nurses' perceptions of the impact of surgical smoke and its countermeasures: A mixed‐methods study.
- Author
-
Moon, Ha Na, Park, Boo Hyo, and Chang, Sung Ok
- Subjects
- *
NURSING education , *NURSES' attitudes , *ACADEMIC medical centers , *FOCUS groups , *RESEARCH methodology , *OCCUPATIONAL exposure , *INTERVIEWING , *SURGICAL smoke , *OPERATING room nursing , *DESCRIPTIVE statistics , *JUDGMENT sampling , *THEMATIC analysis , *PERSONAL protective equipment , *DATA analysis software - Abstract
Although surgical team members are exposed to surgical smoke, most do not fully recognize the hazards of such exposure during surgery. This study aimed to explore the perceptions of surgical smoke and its countermeasures in the operating room, specifically among nurses who have been exposed to surgical smoke for a long time. This was a mixed‐methods study involving focus groups and a descriptive survey. The focus group revealed that nurses believed harmful substances accumulating in the body were proportional to the years worked, and many were unaware of the existent hazards in their work environment. They encouraged the formulation of self‐protection measures and perceived that the recognition of rules and collaboration should take precedence among potential countermeasures. Our survey showed that properly wearing personal protective equipment and being educated on surgical smoke hazards were identified as essential coping methods for nurses. These findings will help create awareness regarding surgical smoke hazards in operating rooms. Policies and systems need to be established at the hospital administration level to substantially reduce the risks associated with surgical smoke for operating room nurses. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
11. Assessment of Counter-Measures for Disturbance Management in Manufacturing Environments
- Author
-
Stich, Volker, Schröter, Moritz, Jordan, Felix, Wenger, Lucas, Blum, Matthias, Rannenberg, Kai, Editor-in-chief, Sakarovitch, Jacques, Series editor, Goedicke, Michael, Series editor, Tatnall, Arthur, Series editor, Neuhold, Erich J., Series editor, Pras, Aiko, Series editor, Tröltzsch, Fredi, Series editor, Pries-Heje, Jan, Series editor, Whitehouse, Diane, Series editor, Reis, Ricardo, Series editor, Furnell, Steven, Series editor, Furbach, Ulrich, Series editor, Winckler, Marco, Series editor, Rauterberg, Matthias, Series editor, Lödding, Hermann, editor, Riedel, Ralph, editor, Thoben, Klaus-Dieter, editor, von Cieminski, Gregor, editor, and Kiritsis, Dimitris, editor
- Published
- 2017
- Full Text
- View/download PDF
12. Anomie in China's Academic Publishing and Measures Taken.
- Author
-
Lu, Jianping
- Subjects
- *
SCHOLARLY publishing , *ENGLISH language , *FRAUD in science , *COMMUNIST parties , *SPELLING errors - Abstract
This paper, by means of quantitative and qualitative analysis based on a vast investigation, talks about the anomie in China's academic publishing from the following three aspects: first, disorders in format; second, misspellings & improper expressions of English language; third, misconduct in ethics. It introduces renovation measures taken by the country's related authorities and practitioners and probes into the deep-seated reasons why so little effect has so far been achieved. It's the first time that scholars have ever reviewed disorders in China's academic publishing in such a multi-dimensional scope. Through briefing the raft of reforms currently launched by the Chinese Communist Party and the State Council, the author expresses her expectation on the upturn of the situation. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
13. IDENTIFICATION OF PEDESTRIAN BLACK SPOTS USING ARCGIS AND IMPROVEMENTS IN ROAD STRETCHES.
- Author
-
PRASHANTH, L. DURGA, H. V., VIBHAV, and R. G., VARUN
- Subjects
PEDESTRIAN accidents ,PEDESTRIANS ,TRAFFIC fatalities ,PARAMETER identification ,INVESTIGATION reports ,POLICE stations - Abstract
It is estimated that 1.35 million individuals expire from road collisions and that over 50 million people are injured globally last year. Road traffic deaths were predicted to be the world's third important reason of death by 2020, and minute work is done to reverse this trend. Road injuries include several dynamic variables that impact the accident to varying degrees and how to identify these variables and differentiate between relationships are the most important problems in trying to avoid and minimize black spots on the route. Based on the category of roads, five road stretches are selected for the study. Data collection are made by collecting the existing road features condition. 223 First Investigation Report (FIR) copies related to study area were obtained from the concerned 12 police stations for three years (2017,2018,2019). The main objectives of the project are analysis of different characteristics of the blackspot such as time of occurrence, type of injuries and the type of vehicle involvement in pedestrian accidents along the stretch. Weighted severity index is used to determine the severity of accidents. Identification of black spot location for pedestrians using kernel density tool in ArcGIS software. Identification of parameters contributing for accidents, and provide countermeasures to reduce the accident rate. [ABSTRACT FROM AUTHOR]
- Published
- 2020
14. Numerical analysis of wind-induced convective heat losses in large-scale open volumetric cavity receivers and the evaluation of countermeasures.
- Author
-
Drexelius, Maximilian, Schwarzbözl, Peter, and Pitz-Paal, Robert
- Subjects
- *
HEAT losses , *NUMERICAL analysis , *WIND speed - Abstract
This study investigates the wind influence on the operation of an open volumetric cavity receiver (OVR) designed with a tower height of approximately 200 m and a total thermal power of 240 MW t h . The receiver design incorporates an air return system where parts of the air are returned between the OVR modules after the heat exchange, while the remainder is recirculated externally from below the receiver. When operating such a scaled-up OVR, ambient wind becomes a relevant parameter in terms of convective losses and the air return ratio, which must be maintained at a high level to ensure economic viability. In this study, ambient wind and the receiver flow are modelled by CFD simulations with the RANS approach. In addition to the evaluation under windless conditions, the simulations in this study cover lateral wind at 4 and 8 m s wind speed. The simulations show the vulnerability of externally returned air as it is significantly influenced by lateral wind. As a countermeasure, wind-adjusted external return air distributions are investigated, which show the potential to reduce convective heat losses due to incomplete air return. In addition, the application of aerowindows is investigated, which has limited potential due to the size of the receiver aperture. The results highlight the importance of the design of the external air return system and suggest a controllable return air system that can be adapted to the current wind situation. • The influence of wind on the convective heat losses in large scale (≥ 200 m) open volumetric cavity receivers has been investigated with CFD simulations. • Ambient wind should be considered in the design of external return air outlets, as it reduces the rate of recirculated air, when air return systems are used. • Adjustable return air outlet distributions are numerically investigated and show the potential to significantly increase the receiver efficiency in the presence of wind. • The applicability of an air curtain to deflect ambient wind is limited by the size of the receiver and is only feasible for small cavities. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Heap Hop! Heap Is Also Vulnerable
- Author
-
Bouffard, Guillaume, Lackner, Michael, Lanet, Jean-Louis, Loinig, Johannes, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Joye, Marc, editor, and Moradi, Amir, editor
- Published
- 2015
- Full Text
- View/download PDF
16. Principles and conditions for the application of countermeasures in the contemporary international law
- Author
-
Анатолий Леонидович Чернявский
- Subjects
counter measures ,international responsibility ,international sanctions ,international coercion ,international wrongful act ,Law - Abstract
The article is devoted to the study of the conditions for the use of countermeasures in the contemporary international law. The application of countermeasures is not sufficiently regulated by the written norms of international law and is predominantly non-codified in a customary manner. The type and size of the countermeasures must be proportional to the offense committed, and the use countermeasures may be recognized as lawful only if the injured State or an international organization puts the offender in a position to comply with its obligations and notify of possible countermeasures. The basic principles of the application of countermeasures are the following: countermeasures should apply only to the State which has committed an internationally wrongful act; the unlawful nature of the act must be determined solely on the basis of the norms of international law; the purpose of applying countermeasures is to restore legitimate rights and interests of the victim only; countermeasures should ensure the return to the previous state that existed prior to the commission of an international offense and should not cause irreparable damage; the application of countermeasures is temporary only. The use of countermeasures is permissible only in case of exhaustion by the victim of other parties not connected with the use of means of protection of their rights and should be terminated when the violated right will be restored. Certain international obligations cannot be terminated in the order of application of countermeasures against the offender. These include, in particular, the obligation to refrain from using force or threat of force, an obligation to protect fundamental human rights, humanitarian obligations and other obligations arising from imperative norms of general international law.
- Published
- 2017
- Full Text
- View/download PDF
17. Problems and counter measures of arc suppression coilin 10 kV distribution system
- Author
-
Shaogui Ai, Pei Ding, Feiyue Ma, Zhang Qingping, Hui Ni, and Yunlong Ma
- Subjects
Physics ,Distribution system ,Capacitive current ,General Engineering ,Coilin ,Topology ,Arc suppression ,Counter measures - Published
- 2023
- Full Text
- View/download PDF
18. Ist die globalisierte Gesellschaft noch zu retten? ⇒ Systemdynamisch: „Pole in der rechten s-Halbebene".
- Author
-
Welfonder, Ernst
- Subjects
COST of living ,DEVELOPING countries ,SUSTAINABLE development ,INDUSTRIALIZATION ,POLISH people - Abstract
Seit Beginn der Industrialisierung haben sich weltweit drei dominierende Eigendynamiken herausgebildet, nämlich die technisch-/wirtschaftliche, die ökologische und die demographische ED. Der verbreitete Einsatz der Rechentechnik sowie das Aufkommen der Automatisierung treiben den Fortschritt immer schneller voran und führen dazu, dass die drei Eigendynamiken – wie quantitativ dargelegt wird – ab 1950 steil ansteigen, d. h. erst seit gut zwei Generationen. Zum Wohle unserer Kinder und Kindeskinder ist ein weltweites Umdenken zwingend erforderlich. Hierzu bedarf es u. a. vielschichtiger staatlicher Maßnahmen zur Erzielung einer nachhaltigen Entwicklung sowie zur Anhebung des Lebensstandards in den Entwicklungsländern. Since the beginning of industrialization three dominant eigendynamics have emerged globally. These are the technic-/economical, the ecological and the demographical eigendynamic. The around use of computer-technique as well as the up-come of automation do push on progress quicker and quicker and lead – as quantitivly pointed out – to a strong increase of the three eigendynamics since 1950, i. e. until now still since a little more than two generations. For our children´s and grand – children´s as well a global rethinking is imperatively necessary. Therefore i. a. diversified governmental counter measures are required for achieving a more sustainable further development and an improvement of the living standard in the developing countries. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
19. STRATEGIC IMPACT OF PAKISTAN'S NUCLEAR PROGRAM IN SOUTH ASIA.
- Author
-
Talpur, Bakhtawar, Bukhari, Ahmed Hussain Shah, and Ghao, Ghulam Mustafa
- Subjects
NUCLEAR energy ,NUCLEAR weapons ,URANIUM enrichment ,SOUTH Asians ,KASHMIR conflict (India & Pakistan) ,FUKUSHIMA Nuclear Accident, Fukushima, Japan, 2011 ,MILITARY weapons - Abstract
The Islamic Republic of Pakistan thus started the development of Nuclear weapons in 1972 to get on the Uranium enrichment. Afterwards, Pakistan conducted itsfirst Nuclear test in May 28, 1998. Pakistan's atomic stance depends on least sound atomic prevention which implies that its atomic weapons have no other job but to counter the hostility from itsfoe. It is apparent that Pakistan's atomic program is India driven. Pakistan needs to keep up vital solidness in the locale and it looks for compromise and harmony, yet India's hawkish approaches towards Pakistan drive it tofind a way to anchor its fringe. Pakistan's atomic foundation is energetically actualizing level-headed countermeasures to react to India's animosity by changing its atomic tenet. This article looks at Pakistan's atomic weapons direction by clarifying the center spurring factors that at present drive the improvement of Pakistan's atomic weaponries stockpile, its teaching and order and control structure. this paper examines the scholastic writing on vital dependability and how the idea identifies with the South Asian setting that drives Pakistani discernments and atomic directions. on the opposite side, it recaps why Pakistan looked for atomic weapons, how Pakistan's atomic engineering advanced and what Pakistan's atomic munitions stockpile presently comprises of. In such setting, this paper is an endeavor to contact different issues with respect to advancement of atomic power in Pakistan, while featuring the job of outside forces which would add to the transient idea of their dynamic relations to create atomic power in Pakistan. The information was gathered for the most part from secoru:/ory sources. [ABSTRACT FROM AUTHOR]
- Published
- 2019
20. A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things
- Author
-
Bishwajeet Pandey, Hula Mahmoud Alkhassawneh, Ala’ A. Eshmawi, Hardik Gohel, Sayed Abdel-Khalek, Rashid A. Saeed, Taher M. Ghazel, and Mohammad Kamrul Hasan
- Subjects
business.industry ,Computer science ,The Internet ,Electrical and Electronic Engineering ,Computer security ,computer.software_genre ,business ,computer ,5G ,Computer Science Applications ,Counter measures - Published
- 2021
- Full Text
- View/download PDF
21. 石油行业发展趋势及中国对策研究.
- Author
-
胡文瑞 and 鲍敬伟
- Abstract
Copyright of Journal of China University of Petroleum is the property of China University of Petroleum and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2018
- Full Text
- View/download PDF
22. A FRAMEWORK FOR COMPARATIVE ANALYSIS OF WSN ATTACKS AND COUNTER MEASURES RECOMMENDATIONS.
- Author
-
Azeem, Mohammed Abdul and khan, Khaleel-ur-Rahman
- Subjects
ELECTRONIC data processing ,ROUTING (Computer network management) ,DATA security ,WIRELESS communications ,AD hoc computer networks - Abstract
The growth in the need for customized services in hand held devices and sensor based applications are continuously motivating the wireless networks, wireless communications and wireless infrastructures. In the last decade the wireless communication has evolved around the MANETs and IoT devices. Nevertheless, the demands for wireless sensors have not decreased due to less costly and simple deployments measures. The wireless networks especially running on the tiny operating systems are designed and programmed to perform very specific tasks. Also, the processing capabilities of these devices are limited. Henceforth, it is difficult to incorporate additional services into the devices such as routing management, data processing or security. The routing management protocols or the data processing frameworks are often the essential part of the framework. Nevertheless, due to the bottleneck between performance and service availability, the service providers ignore the security issues. Considering the wide use of the wireless sensors ranging from healthcare to tactical usage, it is the demand of the modern research to re-address the security measures of the wireless sensor network. In the recent past, the researchers and practitioners have witnessed a number of attacks on WSN infrastructures and policies. The attacks were diversified in terms of distortions of the information, damage to the network or sometimes vulnerability to the user identifications. Hence, none of the single frameworks are capable of detect all types of attacks on WSN. It is been observed that during any attacks on the WSN, the parametric values related to power, energy and response time changes drastically. Henceforth, any measure of the changes and continuous monitoring may lead to finding a pattern in the data tenting to standard formulations. Thus this work proposes a novel framework to detect the behavioural malfunction of the wireless sensor networks based on the energy, power consumption and response time of the nodes. This is proposed to be the major outcome of this work. Yet another novel outcome of this work is to associate the detection model with the attack response knowledge base in order to generate timely recommendations to avoid the damages. The objective of this work is to create a responsive system for controlling the damages caused by any attack on wireless sensor network for making the world of wireless communication more trustable. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
23. Systems resilience assessments: a review, framework and metrics
- Author
-
Elsayed A. Elsayed, Zhiyi Huang, and Yao Cheng
- Subjects
business.industry ,Strategy and Management ,Environmental resource management ,macromolecular substances ,Sociology ,Management Science and Operations Research ,business ,Resilience (network) ,Industrial and Manufacturing Engineering ,Counter measures - Abstract
The past several decades have witnessed an increasing number of natural and manmade hazards with a dramatic impact on the normal operations of the society. The occurrences of these hazards manifest...
- Published
- 2021
- Full Text
- View/download PDF
24. Fatal and Non-Fatal Heroin-Related Overdoses: Circumstances and Patterns
- Author
-
Christian Richter, Rainer Niethammer, Sven Schneider, and Larissa Beisel
- Subjects
Male ,medicine.medical_specialty ,Health (social science) ,Medicine (miscellaneous) ,Context (language use) ,Proxy (climate) ,Heroin ,Drug Users ,Public space ,Intervention measures ,Proxy report ,medicine ,Humans ,Heroin overdose ,Psychiatry ,Heroin Dependence ,business.industry ,Public Health, Environmental and Occupational Health ,Counter measures ,Opiate Overdose ,Psychiatry and Mental health ,Female ,Drug Overdose ,business ,medicine.drug - Abstract
INTRODUCTION Heroin overdose is a leading cause of mortality among drug users. This paper aims to identify individual and contextual factors associated with lethal and non-lethal heroin-related overdoses on the basis of case reports and semi-structured proxy interviews. Typical patterns within these cases are determined by means of cluster analysis. METHODS Within the CaRe (Case Reports of heroin-related overdoses) study, case reports (100 proxy reports of overdose events from 36 different facilities) were gathered and evaluated as part of a nationwide survey of experts conducted in Germany in 2019. Following initial descriptive analyses a two-step cluster analysis with the four binary variables of gender, age, time and place was conducted to identify patterns within the reported cases. RESULTS The case reports grouped into five clusters: 1) Younger male drug users, found in a public space during the daytime; 2) Female drug users; 3) Older male drug users, found in a public space during the daytime; 4) Drug users found at home at night; 5) Drug users found outside at night. Overdoses by female drug users and those which occurred at home and/or at night were significantly more likely to have a fatal outcome. CONCLUSION Future prevention and intervention measures should aim to consider the context, i.e. typical constellations of risk, and attempt to inhibit this through appropriate counter measures.
- Published
- 2021
- Full Text
- View/download PDF
25. Measuring reopening readiness: a universal COVID-19 index for US states
- Author
-
Eunju Suh and Mahdi Alhaery
- Subjects
Value (ethics) ,Actuarial science ,Index (economics) ,Coronavirus disease 2019 (COVID-19) ,media_common.quotation_subject ,Library and Information Sciences ,Phase (combat) ,Test (assessment) ,Counter measures ,Originality ,Pandemic ,Business ,Information Systems ,media_common - Abstract
PurposeWhile United States is among countries with the world’s highest coronavirus infections, its approaches and policies to reopen the economy vary by state. A lack of objective criteria and monitoring toward satisfying the criteria can lead to another COVID-19 outbreak and business closures. Considering the pressing need to return to normalcy without a rebound of COVID-19 infections and deaths, an index that provides a data-driven and objective insight is urgently needed. Hence, a method was devised to assess the severity of the COVID-19 pandemic and determine the degree of progress any state has made in containing the spread of COVID-19.Design/methodology/approachUsing measures such as the weekly averages of daily new deaths, ICU bed occupancy rates, positive cases and test positivity rates, two indexes were developed: COVID-19 reopening readiness and severity.FindingsA clear difference in the pandemic severity trends can be observed between states, which is possibly due to the disparity in the state’s response to coronavirus. A sharp upward trend in index values requires caution prior to moving to the next phase of reopening.Originality/valueThe composite indexes advanced in this study will provide a universal, standardized and unbiased view of each state’s readiness to reopen and allow comparisons between states. This in turn can help governments and health-care agencies take counter measures if needed as to the anticipated demand for future health-care services and minimize adverse consequences of opening.
- Published
- 2021
- Full Text
- View/download PDF
26. Prevention and Counter Measures of Bribery in Athletic Sports Industry
- Author
-
Zhen Bai and Yijun Bai
- Subjects
business.industry ,General Chemical Engineering ,General Materials Science ,Business ,Public relations ,Industrial and Manufacturing Engineering ,Counter measures - Abstract
Through the method of literature and online inquiry, this paper studies the connotation, harm and classification of bribery in competitive sports industry and puts forward countermeasures such as enhancing the sensitivity of judicial enforcement and strengthening the management of sports competitions, which provides the basis for the decision-making of competent departments.
- Published
- 2021
- Full Text
- View/download PDF
27. Modelling an Acousto-Optic Beam Shaping Device for a DIRCM Laser Laboratory Setup
- Author
-
Figen Z.G., Keskin M.Z., Ozdur I.T., Figen Z.G., Keskin M.Z., and Ozdur I.T.
- Abstract
2022 International Conference on Numerical Simulation of Optoelectronic Devices, NUSOD 2022 -- 12 September 2022 through 16 September 2022 -- -- 182933, Directed Infrared Counter Measure (DIRCM) laser laboratory setups are used to mimic the real life DIRCM system and IR heat-seeking missile engagement scenarios in isolated laboratory environments. Typically, the output beam of a mid-infrared (Mid-IR) laser source is modulated in time using an acousto-optic (AO) modulator (AOM). Following the AOM in the optical path, within a distance of few meters, the laser beam is expanded and collimated, using traditional methods to have almost a uniform intensity profile at the target aperture [1, 2]. The whole process results in the simulation of the engagement of a countermeasure laser with an IR heat-seeking missile on an optical table. AO devices, besides their common usage of modulation, can also be used to transform a given laser beam profile into various other beam profiles [3]. By applying an RF signal consisting of multiple frequency components to an AO device, diffraction occurs into multiple orders. By this way, various beam profiles can be obtained along the optical path. In this study, we analyze the usage of an AO device in order to have an expanded beam profile with a uniform intensity distribution at few meters away from the laser source that is enough to cover an IR seeker's aperture. With the use of an AO device for beam shaping, we aim to alleviate the need of costly and complex optical setups. The analysis is made in two dimensions using a numerical simulation software, which employs the finite element method with appropriate boundary conditions. © 2022 IEEE.
- Published
- 2022
28. COVID-19 Counter Measures and Action Plan for Improvement of Nursing Treatment
- Author
-
Kyung Rim Shin
- Subjects
Coronavirus disease 2019 (COVID-19) ,Nursing ,Action plan ,Psychology ,Counter measures - Published
- 2021
- Full Text
- View/download PDF
29. Machine Learning Vulnerability Analysis of FPGA-based Ring Oscillator PUFs and Counter Measures
- Author
-
Mohammed Niamat, Ahmed Oun, and Noor Ahmad Hazari
- Subjects
Exploit ,business.industry ,Manufacturing process ,Computer science ,0102 computer and information sciences ,02 engineering and technology ,Ring oscillator ,01 natural sciences ,020202 computer hardware & architecture ,Counter measures ,010201 computation theory & mathematics ,Hardware and Architecture ,Vulnerability assessment ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,business ,Field-programmable gate array ,Software ,Computer hardware - Abstract
Physical Unclonable Functions (PUFs) exploit the manufacturing process variations inherent in silicon-based chips to generate unique secret keys. Although PUFs are supposed to be unclonable or unbreakable, researchers have found that they are vulnerable to machine learning (ML) attacks. In this article, we analyze the vulnerability of different FPGA-based Ring Oscillator PUFs (ROPUFs) to machine learning attacks. The challenge-response pairs (CRPs) data obtained from different ROPUFs is trained using different machine learning algorithms. From the study, it is found that the Artificial Neural Network (ANN) models can be used to train the ROPUFs with a training accuracy of 99.9% and a prediction accuracy of 62% when 5,000 CRPs are used for a challenge-response ROPUF. In this article, we assume a realistic situation where a small set of the CRP dataset (approximately 15% maximum) is unscrupulously obtained by the hacker. A prediction accuracy of 62% makes the PUF vulnerable to machine learning attacks. Therefore, a secondary goal of this article is the design of a ROPUF capable of thwarting machine learning modeling attacks. The modified XOR-inverter ROPUF drastically reduces the prediction accuracy from 62% to 13.1%, thus making it increasingly difficult for hackers to attack the ROPUF.
- Published
- 2021
- Full Text
- View/download PDF
30. Mental health, physical symptoms and biomarkers of stress during prolonged exposure to Antarctica's extreme environment
- Author
-
Joanne L. Bower, Forrest L. Baker, Chris Connaboy, Candice A. Alfano, Christine J So, Kyle A. Smith, Nadia H. Agha, and Richard J. Simpson
- Subjects
020301 aerospace & aeronautics ,business.industry ,Stressor ,Psychological intervention ,Aerospace Engineering ,02 engineering and technology ,01 natural sciences ,Mental health ,Psychological risk ,Checklist ,Counter measures ,Prolonged exposure ,0203 mechanical engineering ,0103 physical sciences ,Trait ,Medicine ,business ,010303 astronomy & astrophysics ,Clinical psychology - Abstract
The Antarctic environment is characterized by many of the same extreme stressors as long-duration space flight (LDSE), thereby providing a useful earth-based analog for examining changes in and predictors of mental health over time. At coastal (n = 88) and inland (n = 22) Antarctic stations we tracked mental health symptoms across a nine-month period including winter-over using the Mental Health Checklist (MHCL; Bower et al., 2019). Our monthly assessment battery also examined changes in physical complaints, biomarkers of stress, and the use of different emotion regulation strategies. MHCL positive adaptation scores showed linear decreases whereas MHCL poor self-regulation scores and severity of physical symptoms increased across the study period. During-mission use of emotion regulation strategies and dehydroepiandrosterone (DHEA) levels predicted end-of-study MHCL scores, whereas trait-based psychological measures collected at the start of the mission showed little predictive utility. Results suggest that interventions and counter measures aimed at enhancing positive affect/emotion during prolonged exposure to extreme environments may be useful in reducing psychological risk.
- Published
- 2021
- Full Text
- View/download PDF
31. The Problems and Counter-Measures of Hospitality Security in Korea
- Author
-
Se-Hee Jung and Chang-Moo Lee
- Subjects
Industrial security ,business.industry ,Hospitality ,Security management ,Marketing ,business ,Hospitality industry ,Counter measures - Published
- 2021
- Full Text
- View/download PDF
32. Establishing the Status of Patients With Non-Communicable Diseases in Disaster: A Systematic Review
- Author
-
Javad Aghazadeh-Attari, Elham Ghazanchaei, Iraj Mohebbi, and Davoud Khorasani-Zavareh
- Subjects
business.industry ,Public Health, Environmental and Occupational Health ,Scopus ,Disease ,030204 cardiovascular system & hematology ,Counter measures ,Disasters ,03 medical and health sciences ,0302 clinical medicine ,Neoplasms ,Environmental health ,Humans ,Medicine ,030212 general & internal medicine ,Noncommunicable Diseases ,business - Abstract
Objective:People with NCDs are particularly vulnerable to disasters. This research systematically reviewed reports describing studies on the status of patients with NCDs before, during and after disasters.Method:Relevant articles published from 1997 to 2019 were collected by searching the Scopus, PubMed, and Science Direct databases. We specifically examined reports describing NCDs and including the key words ‘Non-Communicable Disease and Disasters.’ NCDs include cardiovascular, respiratory, diabetes and cancer diseases.Results:The review identified 42 relevant articles. Most of the included studies were found to have described the conditions of patients with NCDs after disasters - 14 (13.3%), during disasters – 11 (26.2%), before disasters – 6 (14.3%), within all stages of disasters: before, during and after – 6 (14.3%), only during and after disasters – 4 (9.5%), and includes before and during disasters – 1 (2.4%).Conclusion:NCDs pose major health issues in disasters. Development of strong counter measures against the interruption of treatment, as well as surveillance systems to ascertain medical needs for NCDs are necessary as preparation for future disasters.
- Published
- 2021
- Full Text
- View/download PDF
33. Laser-Based Systems for Standoff Detection of CWA: A Short Review
- Author
-
Anil Kumar Razdan, Mukesh Kumar Jindal, Mainuddin Mainuddin, and S. Veerabuthiran
- Subjects
Chemical Warfare Agents ,Ion-mobility spectrometry ,Ranging ,Laser ,Counter measures ,law.invention ,Dial ,Lidar ,law ,Environmental science ,Electrical and Electronic Engineering ,Absorption (electromagnetic radiation) ,Instrumentation ,Remote sensing - Abstract
In recent times, the use of Chemical Warfare (CW) agents against civilian and military by terrorists and rogue countries are recurrent. The examples of such attacks are available in open literature. They are highly dangerous due to their acute toxicity nature. They tend to stimulate and paralyze nerve system of the body and cause other toxic side effects. Once these toxic chemicals are released into the atmosphere, timely detection and identification of the same at standoff distances will help the defensive forces to take proper counter measures. Detection techniques such as ion mobility spectrometry, infrared spectrometry, Raman spectrometry, FTIR, LIDAR, etc. have been used widely. Among all these techniques, Raman spectroscopy techniques and LIDAR (LIght Detection and Ranging) is the only active remote detection method that can detect and discriminate the chemical agents at standoff distances. Infrared DIAL (Differential Absorption Lidar) is a versatile technique for remote detection of various chemicals. DIAL technique can provide spatially resolved measurements of these agents with sufficient sensitivity (at few ppm levels) at ranges of several kilometers by exploiting the concept such as scattering and absorption from the atmosphere. The main objective of this review paper is to bring out the details of highly potential chemical warfare agents, their properties and laser based remote detection sensors. LIDAR technique is emphasized in more detail because of their long range detection capability, sensitivity and selectivity. An overview of existing R&D based and commercial systems is also discussed.
- Published
- 2021
- Full Text
- View/download PDF
34. An investigation of work-related strain effects and coping mechanisms among South African construction professionals
- Author
-
Paul Bowen, Peter Edwards, and Rita Peihua Zhang
- Subjects
Strain (biology) ,05 social sciences ,0211 other engineering and technologies ,02 engineering and technology ,Building and Construction ,Work related ,Industrial and Manufacturing Engineering ,Work environment ,Management Information Systems ,Counter measures ,021105 building & construction ,0502 economics and business ,Psychology ,Social psychology ,050203 business & management - Abstract
Construction is a demanding work environment. Many construction professionals experience workplace stress, leading to physiological, psychological and sociological strain effects. They adopt a vari...
- Published
- 2021
- Full Text
- View/download PDF
35. Effects of COVID-19 Epidemic on China's Service Trade and Counter measures
- Author
-
Fu Xin
- Subjects
Coronavirus disease 2019 (COVID-19) ,business.industry ,Business ,International trade ,China ,Service trade ,Counter measures - Published
- 2021
- Full Text
- View/download PDF
36. Violence against Women: Trends and Counter Measures in Smart Cities of India
- Author
-
Arpita Mitra and Nirmal Kanti Chakrabarti
- Subjects
Urban sociology ,media_common.quotation_subject ,Criminology ,Metropolitan area ,Literacy ,Education ,Counter measures ,Politics ,Harm ,Political science ,Pandemic ,Developmental and Educational Psychology ,Crime statistics ,General Psychology ,media_common - Abstract
Violence against women is a world-wide crisis of pandemic magnitude. The crime statistics in India show a steady increase in violence against women in urban areas.Different theories in Criminology have sought to explain violent crime in general and violence against women in particular.Violence inhibits harm both psychological and physical.The crime statistics is self explanatory and exhibits the scenario of violence against women in nineteen metropolitan cities of India which are smart cities. However it deserves mention that the level of literacy,development of the states, religious and cultural values,geographical and political location of the city can play provocative causes for the incidents of criminality. Collaborative effort of the people, NGOs and the urban police can foster sustainable urban society which are smart in the true sense of the term. Each city has its unique characteristics, issues of concern and distinct demographic and environmental conditions which influence people's life and crime trends. Thus each commissionerate should identify the lacunae, problems and prioritise accordingly and can thereby succeed in achieving success in combating crime. The present study analyses the trends of violence against women in smart cities of India and attempts to explore the counter measures that can be undertaken to eradicate the bane.
- Published
- 2021
- Full Text
- View/download PDF
37. Multi-epitope vaccine against SARS-CoV-2 applying immunoinformatics and molecular dynamics simulation approaches
- Author
-
Jyotisha, Samayaditya Singh, and Insaf A. Qureshi
- Subjects
2019-20 coronavirus outbreak ,COVID-19 Vaccines ,Coronavirus disease 2019 (COVID-19) ,Severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) ,030303 biophysics ,Epitopes, T-Lymphocyte ,Molecular Dynamics Simulation ,Biology ,03 medical and health sciences ,Structural Biology ,Case fatality rate ,Humans ,Molecular Biology ,0303 health sciences ,SARS-CoV-2 ,COVID-19 ,General Medicine ,Multi epitope ,Virology ,Counter measures ,Molecular Docking Simulation ,immunoinformatic approach ,multi-epitope vaccine ,Spike Glycoprotein, Coronavirus ,Vaccines, Subunit ,Epitopes, B-Lymphocyte ,receptor-binding domain ,Research Article - Abstract
COVID-19, caused by SARS-CoV-2, is severe respiratory illnesses leading to millions of deaths worldwide in very short span. The high case fatality rate and the lack of medical counter measures emphasize for an urgent quest to develop safe and effective vaccine. Receptor-binding domain (RBD) of spike protein of SARS-CoV-2 binds to the ACE2 receptor on human host cell for the viral attachment and entry, hence considered as a key target to develop vaccines, antibodies and therapeutics. In this study, immunoinformatics approach was employed to design a novel multi-epitope vaccine using RBD of SARS-CoV-2 spike protein. The potential B- and T-cell epitopes were selected from RBD sequence using various bioinformatics tools to design the vaccine construct. The in silico designed multi-epitope vaccine encompasses 146 amino acids with an adjuvant (human beta-defensin-2), which was further computationally evaluated for several parameters including antigenicity, allergenicity and stability. Subsequently, three-dimensional structure of vaccine construct was modelled and then docked with various toll-like receptors. Molecular dynamics (MD) study of docked TLR3-vaccine complex delineated it to be highly stable during simulation time and the stabilization of interaction was majorly contributed by electrostatic energy. The docked complex also showed low deformation and increased rigidity in motion of residues during dynamics. Furthermore, in silico cloning of the multi-epitope vaccine was carried out to generate the plasmid construct for expression in a bacterial system. Altogether, our study suggests that the designed vaccine candidate containing RBD region could provide the specific humoral and cell-mediated immune responses against SARS-CoV-2. Communicated by Ramaswamy H. Sarma
- Published
- 2020
- Full Text
- View/download PDF
38. Formjacking attack: Are we safe?
- Author
-
Vijaya Geeta Dharmavaram
- Subjects
Computer science ,Supply chain attack ,Computer security ,computer.software_genre ,Counter measures ,Deep Web ,Credit card ,Information sensitivity ,Norm (artificial intelligence) ,Identity theft ,Online business ,Law ,General Economics, Econometrics and Finance ,computer - Abstract
Purpose Today, online shopping and online business has become a new norm especially in the current pandemic scenario. With more businesses running online, cyber criminals are coming up with different tactics to steal identity and sensitive information such as credit card and banking credentials either for personal monetary gain or to sell in the dark Web. One form of such attack that is seen in the recent times is formjacking attack. This paper aims to review the current scenario of formjacking attack and its modus operandi. The paper also provides certain counter measures that can be adopted by the users and website owners. Design/methodology/approach The paper mainly focuses on the modus operandi of formjacking attack to understand the severity of the problem. Based on the way the attack is carried out, some guidelines to be followed are provided. Later, a brief review of machine learning techniques is furnished to understand how it may help as secure defense mechanism. Findings Formjacking attacks are on a rise in the past two years, especially during the holiday season. Cyber criminals have been using smart tactics to carry out these attacks which are very difficult to detect. Machine learning techniques may prove to be effective in combating these attacks. Originality/value Formjacking attack is not just a concern of the customers who may lose their sensitive data, but the onus also lies on the companies itself to ensure they protect their customer’s data from theft. Not much research is found regarding formjacking attack, as it is relatively a new form of attack. The paper reviews this attack and provides some measure that can be followed. It also provides few guidelines which can be used for further research in devising a security tool to mitigate this problem.
- Published
- 2020
- Full Text
- View/download PDF
39. Anomie in China’s Academic Publishing and Measures Taken
- Author
-
Jianping Lu
- Subjects
business.industry ,05 social sciences ,Library and Information Sciences ,050905 science studies ,Counter measures ,Qualitative analysis ,Anomie ,Publishing ,Sociology ,0509 other social sciences ,Social science ,050904 information & library sciences ,business ,China - Abstract
This paper, by means of quantitative and qualitative analysis based on a vast investigation, talks about the anomie in China’s academic publishing from the following three aspects: first, disorders...
- Published
- 2020
- Full Text
- View/download PDF
40. Release of hazardous volatile organic compounds from endoscopic submucosal dissection
- Author
-
Sun Gyo Lim, Choong Gyun Noh, Hye Shin Ahn, Kee Myung Lee, Silvana Perretta, Bernard Dallemagne, and Jae Bum Park
- Subjects
Air Pollutants ,Volatile Organic Compounds ,Endoscopic Mucosal Resection ,Trichloroethylene ,business.industry ,Tetrachloroethylene ,Endoscopic submucosal dissection ,Counter measures ,03 medical and health sciences ,chemistry.chemical_compound ,0302 clinical medicine ,Indoor air quality ,chemistry ,Hazardous waste ,Air Pollution, Indoor ,030220 oncology & carcinogenesis ,Environmental chemistry ,Humans ,Medicine ,030211 gastroenterology & hepatology ,Surgery ,Gas chromatography ,business ,Air quality index ,Environmental Monitoring - Abstract
Although it has been proven that various volatile organic compounds (VOCs) are produced during surgery, there have been no studies focusing specifically on endoscopy. Therefore, we aimed to investigate VOCs produced during endoscopic submucosal dissection (ESD). Thirty-one patients scheduled for ESD were enrolled in this study. Sorbent tubes were installed to collect gas at two sites: one in a suction bottle and the other at the level of the endoscopists’ upper chest. Gas collections were performed for up to 30 min during submucosal dissection. Quantitative analysis of the VOCs in gas samples was performed using gas chromatography and mass spectrometry. Concentrations of fifteen VOCs were measured. The total concentration of volatile organic compounds (TVOC) was also calculated. Among the five carcinogens—benzene, ethylbenzene, formaldehyde, tetrachloroethylene, and trichloroethylene (TCE)—measured, excess life-time risks of cancer for benzene and TCE were interpreted as unacceptable based on the New Jersey Department of Environmental Protection Division of Air Quality and the Environmental Protection Agency guidelines (5 × 10–4 and 7 × 10–5, respectively). Among the non-carcinogenic VOCs, the mean concentration of toluene was much higher than the reference value (260 μg/m3) in the Japanese guidelines for indoor air quality (IAQ) (1323.7 ± 2884.0 μg/m3 from the air at the upper chest level of endoscopists and 540.9 ± 1345.4 μg/m3 from the suction bottle). Mean TVOCs were at least 10 times higher than the reference value (400 μg/m3) issued by the Japanese guidelines for IAQ. Various carcinogenic and non-carcinogenic VOCs were detected at levels higher than the reference “safe” values during the submucosal dissection step of ESD. Implementation of counter measures is essential to protect medical personnel who are involved in ESD surgeries.
- Published
- 2020
- Full Text
- View/download PDF
41. DISCONNECTIONS IN 0.4 KV ELECTRIC NETWORKS: QUANTITY, REASONS AND COUNTER MEASURES
- Author
-
Alina Vinogradova, Vadim Bolshev, and Aleksandr Vinogradov
- Subjects
Computer science ,0502 economics and business ,05 social sciences ,050211 marketing ,010501 environmental sciences ,01 natural sciences ,0105 earth and related environmental sciences ,Counter measures ,Reliability engineering - Abstract
Studies were carried out with the aim of analyzing blackouts in electric networks of 0.4 ... 10 kV and determining the main countermeasures to reduce their number. As an indicator of reliability, the failure rate of the main network elements is analyzed. The total number of outages considered included consumer outages, outages due to damage to 0.4 kV overhead power lines (transmission lines) and transformer substation (TS) equipment. The studies were carried out on the basis of the data of Mtsenskiy, Orloyskiy and Pokrovsky districts of electric networks of “Oreloenergo” – a branch of PJSC “MRSK Center” and JSC “Oreloblenergo” in the period from 2015 to 2017. Most of the causes of damage to power line equipment of 0.4 and transformer substations of 10/0.4 kV can be prevented by increasing the level of its maintenance and conducting timely diagnostics. The determination of quantitative indicators of the effectiveness of countermeasures to reduce the number of outages is difficult due to the lack of technical condition monitoring systems in electric networks. The main measures aimed at solving this problem in 0.4 kV networks are the transition to power lines with insulated wires; improving the design of switching devices, switches and transformer leads; the use of diagnostic tools; disaggregation of power lines. Replacing the equipment of electric grids with new types provides the economic effect of reducing the frequency of failures, as well as saving due to a reduction in maintenance costs. In particular, replacing transformers with hermetic ones allows reducing electricity shortfalls by 43.6%, and insulated wires by 95.3%
- Published
- 2020
- Full Text
- View/download PDF
42. Characteristics of Cyber Security Threats in the era of the 4th Industrial Revolution and Peaceful Counter measures
- Author
-
Suk-hoon Hong and Young-ae Jung
- Subjects
General Medicine ,Business ,Computer security ,computer.software_genre ,Industrial Revolution ,computer ,Human security ,Counter measures - Published
- 2020
- Full Text
- View/download PDF
43. The Gray Zone Strategy of Northeast Asian States and South Korea’s Bespoke Counter-Measures
- Author
-
Jhu Ban Gil
- Subjects
Geography ,Gray (horse) ,Cartography ,Bespoke ,Counter measures - Published
- 2020
- Full Text
- View/download PDF
44. Tinjauan Hukum Islam pada Edaran Pemerintah dan MUI dalam Menyikapi Wabah Covid-19
- Author
-
Alif Jumai Rajab, Hayatullah Mubarak, and Muhamad Saddam Nurdin
- Subjects
Government ,Coronavirus disease 2019 (COVID-19) ,media_common.quotation_subject ,Social distance ,Islam ,Plague (disease) ,Prayer ,Counter measures ,Law ,Political science ,General Earth and Planetary Sciences ,Normative ,General Environmental Science ,media_common - Abstract
The research is talking about a virus spread across the world with her being taken from the government and MUI as the Islamic regime. The government itself has issued a hand-to-hand lockdown system and also a PSBB or social distaff to fight the spread of the virus covid-19, so is the counter measures done by MUI by canceling traditional player in the mosque and by reducing Friday prayer in regular. Even though this circular became a pro and cons for most of society especially at the rings of MUI. The purpose of this research is to help the public understand whether the government’s existence and MUI’s treatment of the plague corresponds to or even contradicts the Islamic regime. Research methods will be used with literature literature review with the normative approarch and supported by the historial approach. Research shows that the rule imposed by the government and MUI in handling the outbreak did not include an investigation into Islam.
- Published
- 2020
- Full Text
- View/download PDF
45. On the issue of the existing counter — extremism and terrorism strategies
- Author
-
Vladimir E. Tyurikov
- Subjects
Deradicalization ,business.industry ,Political science ,Terrorism ,General Earth and Planetary Sciences ,Social consequence ,Scientific field ,Public relations ,Affect (psychology) ,business ,General Environmental Science ,Counter measures - Abstract
This article presents a review and a synthesis of basic strategies and approaches, which constitute the basis of modern strategies for combating extremist and terrorist threats or their prevention. The approaches to the matter are defined, and their social consequences are considered. It summarizes the issues, concerning prior aspects of counter-terrorism strategies, which should be taken into consideration. It also presents some critical expert views whether any universal foundations for counter-terrorism strategies could be found. The author pays attention to the existing general difficulties at this scientific field, which directly affect the studys success. It focuses on the importance of careful approach to the issue from both by the general public and policy makers.
- Published
- 2020
- Full Text
- View/download PDF
46. Problems of animal husbandry after the Chernobyl accident: radiation situation, counter-measures
- Author
-
P.N. Tsygvintsev, S.V. Fesenko, N.N. Isamov, O. S. Gubareva, and N.I. Sanzharova
- Subjects
Accident (fallacy) ,Environmental health ,Business ,Animal husbandry ,Counter measures - Published
- 2020
- Full Text
- View/download PDF
47. A logical consideration on fraudulent email communication
- Author
-
Noboru Babaguchi and Seiko Myojin
- Subjects
Scenario based ,Computer science ,Compromise ,media_common.quotation_subject ,0206 medical engineering ,02 engineering and technology ,Computer security ,computer.software_genre ,020601 biomedical engineering ,General Biochemistry, Genetics and Molecular Biology ,Counter measures ,Trap (computing) ,03 medical and health sciences ,0302 clinical medicine ,Artificial Intelligence ,Detecting deception ,Internet users ,computer ,030217 neurology & neurosurgery ,media_common ,Communication channel - Abstract
One of the most serious problems in modern society is that internet users are deceived by various fake information. In this paper, we analyse a scenario based on an actual incident of fraud called business email compromise (BEC). We suppose that each email, in the incident, step-wisely changes user’s thinking and makes him or her believe the emails. If fraud has such a step-by-step mechanism, it allows us to consider counter measures for dissuading a user from decision-making on the way. We discuss features and factors of the incident based on formulations of Channel theory. Our analysis revealed that each email message influenced user’s decision-making by what kind of logical trap. It can be fundamental knowledge that is capable of warning the user with predicting logical traps. This paper contributes to providing a novel viewpoint to develop systems for detecting deception of BEC.
- Published
- 2020
- Full Text
- View/download PDF
48. IoT: Effective Authentication System (EAS) using Hash based Encryption on RFID Attacks
- Author
-
Smitha Nayak, Janaki Sivakumar, and Amala Nirmal Doss
- Subjects
RFID ,IOT ,021110 strategic, defence & security studies ,Computer science ,business.industry ,Hash function ,0211 other engineering and technologies ,General Engineering ,Network ,020206 networking & telecommunications ,EAS ,02 engineering and technology ,Authentication system ,Pseudonym ,Perceptron ,Computer security ,computer.software_genre ,Encryption ,Counter measures ,Asynchronous communication ,0202 electrical engineering, electronic engineering, information engineering ,Internet of Things ,business ,computer - Abstract
Internet of Things (IoT) is undoubtedly a well-known research area. Security on IoT communication services is the major challenge with advanced technology and devices. This paper mainly focusing on Perceptron layer based attacks and counter measures based on Effective Authentication System (EAS). This paper is ordered as outlining IoT Architecture, Types of Threats ,Perceptron Layer based attacks, sensor based communication services ,RFID mechanism ,Tag identify and verification by back end server and Hash based Effective Authentication System (EAS) to avoid pseudonym attacks .This paper proposes EAS as security measure by preventing privacy attack, pseudonym attack, location tracking and asynchronous attack.
- Published
- 2020
- Full Text
- View/download PDF
49. The limitations in the state-of-the-art counter-measures against the security threats in H-IoT
- Author
-
Sung Won Kim, Rashid Ali, Fadi Al-Turjman, Arslan Musaddiq, Dae Wan Kim, and Yazdan Ahmad Qadri
- Subjects
Computer Networks and Communications ,Network packet ,business.industry ,Computer science ,Routing table ,020206 networking & telecommunications ,Cryptography ,02 engineering and technology ,Computer security ,computer.software_genre ,Counter measures ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,State (computer science) ,business ,Internet of Things ,computer ,Software - Abstract
Internet of Things (IoT) technology is anticipated to pave the way for groundbreaking applications in a number of areas of current healthcare systems. Given the significant number of connected medical devices, the vital data generated by the patient is under several security threats. Selective Forwarding (SF) and Wormhole (WH) attacks are two critical threats that cause information deficit in the network. The SF attack drops critical data packets at compromised nodes while the WH attack creates fallacious routing tables due to the introduction of malicious routes in the network. In this paper, we focus on the security aspects of Healthcare-IoT and review the proposed counter-measures against the SF and WH attacks. We weigh the recently postulated counter-measures based on their significance and identify their limitations. Additionally, we propose a blockchain-based cryptographic framework for mitigating SF and WH attacks in H-IoT. We explore future research directions in mitigating these threats.
- Published
- 2020
- Full Text
- View/download PDF
50. Acoustic features exploration and examination for voice spoofing counter measures with boosting machine learning techniques
- Author
-
Raoudha Rahmeni, Yassine Ben Ayed, and Anis Ben Aicha
- Subjects
Spoofing attack ,business.industry ,Computer science ,020206 networking & telecommunications ,Pattern recognition ,02 engineering and technology ,Counter measures ,Set (abstract data type) ,Tree (data structure) ,0202 electrical engineering, electronic engineering, information engineering ,General Earth and Planetary Sciences ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,General Environmental Science - Abstract
Automatic Speaker verification systems are vulnerable to spoofing attacks. We propose our anti-spoofing system. It uses some acoustic features. The set of binary classifiers includes XGBoost tree boosting algorithm. ASV Spoof 2015 corpus is utilized in the experiments as the main database for anti-spoofing systems training. The pretreatment of acoustic features is essential for better performance of the system. Obtained results demonstrate that the proposed system can provide a good accuracy. High evaluation performance can be obtained using the combination between MFCC, LogFBE and SSC features. The attained metrics values such 97.80% for the accuracy, 97.12% for the precision, 98.50% for the Recall and 97.81% for the F1-mesure validate the performance of the proposed technique.
- Published
- 2020
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.