The usage of cybersecurity is growing steadily because it is beneficial to us. When people use cybersecurity, they can easily protect their valuable data. Today, everyone is connected through the internet. It’s much easier for a thief to connect important data through cyber-attacks. Everyone needs cybersecurity to protect their precious personal data and sustainable infrastructure development in data science. However, systems protecting our data using the existing cybersecurity systems is difficult. There are different types of cybersecurity threats. It can be phishing, malware, ransomware, and so on. To prevent these attacks, people need advanced cybersecurity systems. Many software helps to prevent cyber-attacks. However, these are not able to early detect suspicious internet threat exchanges. This research used machine learning models in cybersecurity to enhance threat detection. Reducing cyberattacks internet and enhancing data protection; this system makes it possible to browse anywhere through the internet securely. The Kaggle dataset was collected to build technology to detect untrustworthy online threat exchanges early. To obtain better results and accuracy, a few pre-processing approaches were applied. Feature engineering is applied to the dataset to improve the quality of data. Ultimately, the random forest, gradient boosting, XGBoost, and Light GBM were used to achieve our goal. Random forest obtained 96% accuracy, which is the best and helpful to get a good outcome for the social development in the cybersecurity system.
The most important issue of economic development is the question of the real reasons for the growth of labor productivity based on innovative equipment and technologies or “closing technologies”, both directly and in the sphere of organization and management of economic systems. Organizational innovations can also be classified as “closing technologies”. For example, the creation of strategic institution, alliances and associations capable of changing the situation in the global economy, likely World Bank (WB), World Health Organization (WHO), International association Brazil, Russia, India, China, South Africa (BRICS) etc. This approach involves the formation of fundamental innovative solutions at all levels of the management hierarchy. The imperfection of the existing ideological and methodological paradigm, ignoring the mathematical constants of the Universe when designing economic supersystems or economic systems as integral distributed systems with complex dynamics similar to natural systems, the inefficiency of institutional intervention is the main reason for the impossibility of minimizing the structural and functional instability of the state economic system. The consequence of this is systemic violations and disproportions in the economy, risks associated with changes in the structure of the world economy and a colossal difference in the level of economic security of states and the phenomenon of crisis transfer.
Global economic competition is leading companies to improve their competitiveness by increasing production and eliminating the main obstacles to the process of making products available. This approach concerns both SMEs and SMIs as well as multinationals. Thus, the Compagnie Minière de l’Ogooué (COMILOG), a subsidiary of the French group ERAMET, which until recently had a monopoly on manganese mining in Gabon, must now face competition from Asian operators. To export its ore, COMILOG must first transport it by rail for nearly 650 km, from the Moanda site (south-east of the country) to the port of Owendo. However, port operations, which until then took place exclusively during the day, limited the company’s export capacities and the profits made, while increasing the stopover time of ships and their operating costs. To remedy this, the French company introduced nighttime docking and departures. This work addresses the challenges of the performance of port operations at the Owendo ore terminal and the security and natural risks of night manoeuvres. The general objective of the study is to assess the impact of these night services on ship traffic, on the one hand, and to identify the related socio-economic and security issues, on the other hand. Data collection was carried out using documentary research in libraries and research centres, consultation of websites, semi-directed interviews, questionnaire surveys and participatory observation. The sample of 50 people surveyed took into account management staff, supervisors and line managers, integrating the diversity of actors involved in the processing of ships calling at the port of Owendo. Finally, the surveys attest to a clear reduction in the time spent by ships at the Owendo Ore Port and an increase in their number calling. They also confirm the improvement in tonnages embarked and the improvement in turnover achieved by COMILOG. This study led to the conclusion that the introduction of night manoeuvres at the port of Owendo allowed COMILOG to increase its exports and the number of ore carriers received in stopover and then improve its turnover.
With the increasing climate change crisis, the ongoing global energy security challenges, and the prerequisites for the development of sustainable and affordable energy for all, the need for renewable energy resources has been highlighted as a global aim of mankind. However, the worldwide deployment of renewable energy calls for large-scale financial and technological contributions which many States cannot afford. This exacerbates the need for the promotion of foreign investments in this sector, and protecting them against various threats. International Investment Agreements (IIAs) offer several substantive protections that equally serve foreign investments in this sector. Fair and Equitable Treatment (FET) clauses are among these. This is a flexible standard of treatment whose boundaries are not clearly defined so far. Investment tribunals have diverse views of this standard. Against this background, this article asks: What are the prominent international renewable energy investment threats, and how can FET clauses better contribute to alleviating these concerns? Employing a qualitative method, it analyses the legal aspects and properties of FET and concludes that the growing security and regulatory threats have formed a sort of modern legitimate expectations on the part of renewable energy investors who expect host states to protect them against such threats. Hence, IIAs and tribunals need to uphold a definite and broadly applicable FET approach to bring more consistency and predictability to arbitral awards. This would help deter many unfavourable practices against investments in this sector.
This paper presents an effective method for performing audio steganography, which would help in improving the security of information transmission. Audio steganography is one of the techniques for hiding secret messages within an audio file to maintain communication secrecy from unwanted listeners. Most of these conventional methods have several drawbacks related to distortion, detectability, and inefficiency. To mitigate these issues, a new scheme is presented which combines the techniques of image interpolation with LSB encoding. It selects non-seed pixels to allow reversibility and diminish distortion in medical images. Our technique also embeds a fragile watermarking scheme to identify any breach during transmission to recover data securely and reliably. A magic rectangle has also been used for encryption to enhance data security. This paper proposes a robust, low-distortion audio steganography technique that provides high data integrity with undetectability and will have wide applications in sectors like e-healthcare, corporate data security, and forensic applications. In the future, this approach will be refined for broader audio formats and overall system robustness.
The Malaysian government’s efforts to promote solar photovoltaic (PV) usage among households face a challenge due to its low adoption rate. This study delves into the factors influencing the exponential adoption of solar PV electricity generation among landed residential property owners in Malaysia. The research aims to comprehensively examine the predictors influencing the adoption of solar PV systems among Malaysian households. Hence, the study employs an enhanced Theory of Planned Behavior framework, integrating sustainable energy security dimensions such as availability, affordability, efficiency, acceptability, regulation, and governance. The sample comprised 556 Malaysian residents who owned and resided in the landed properties. The home locations where at least one solar PV installation existed within a residential street. Snowball sampling was employed through referrals, leveraging social and community networks. Collected data was analyzed using the partial least squares structural equation modeling. Attitude, affordability, and acceptability emerged as pivotal factors significantly impacting the intention to use solar PV systems among Malaysian households. This research not only enriches academic discourse but also offers practical implications for policymakers, guiding the formulation of targeted strategies to promote sustainable energy practices and facilitate the widespread adoption of solar PV systems in Malaysia.
Copyright © by EnPress Publisher. All rights reserved.